Articles

The 15 Strategies For Combating & Detecting APTs

The 15 Strategies For Combating & Detecting APTs

Advanced Persistent Threats (APTs) are some of the most dangerous and demanding challenges to computer security. They’ve been known to steal valuable company intellectual capital and even government secrets. So, it’s important to know if you’ve been targeted by one, and how to contain and combat the threat. Below Raed Albuliwi, Vice President of ANRC helps lay out the strategies for helping keep your network safe. ANRC is a sponsor of The 2nd Annual Cyber Security for Defense event, and will also be speaking on the topic of “Network Intrusion.”

DoD Looks to Private Sector for Cyber Security Partnerships

DoD Looks to Private Sector for Cyber Security Partnerships

With every passing week, the necessity and vulnerability -- of cyberspace becomes more apparent. While recent technology advances developed in Silicon Valley and elsewhere have made many things in modern life “easier, cheaper and safer,” Defense Secretary Ashton Carter noted that “it’s become clear that these same advances and technologies also present a degree of risk to the businesses, governments, militaries, and individual people who rely on them every day …"

On the Verge of Explosive Growth: Cyber Pearl Harbour

On the Verge of Explosive Growth: Cyber Pearl Harbour

This document from the DefenceIQ Intelligence and Analysis Unit, discusses which market segment for cyber security is on the verge of explosive growth during 2015-16 under simultaneous pressure from the insurance industry and upcoming government regulation. It highlights one of the critical oversights in the cyber security market, and how big cyber practices are missing out on a lucrative opportunity below their competitors’ radar.

Navy Sends Out An H.O.S. Challenge—Hack Our Ship—To Woo Millennial Tech Talent

Navy Sends Out An H.O.S. Challenge—Hack Our Ship—To Woo Millennial Tech Talent

Looking to tap cyber talent in the private sector, the U.S. Navy has been holding a series of hackathons. The challenge: Find a way to crack the security systems of military drones and warships. Courtesy of FastCompany.com
WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks announced that it has obtained thousands of files allegedly originating from a high-security network of the U.S. Central Intelligence Agency (CIA). The huge trove of data, called “Vault 7,” exposed the hacking capabilities of the US Intelligence Agency and its internal infrastructure.
Digital Transformation is the first line of Defence

Digital Transformation is the first line of Defence

In today’s digital age, governments, businesses and citizens are all seeking to create new opportunities and efficiencies through the use of digital technologies. For defence agencies, the secure, fluid and timely flow of data and intelligence is the life-blood of modern military activity.