App Access: Life Invasion

Author(s):

Josh Henry, ,

Guy in front off computer with app access

Life Invasion: Your Privacy A problem that has been occurring for years is finally generating concern. 77% of Americans own smart phones. Majority of those people make the mistake of allowing apps such as Facebook to gain access to their camera roll. It all seems innocent until your private photos start trending and get into … Read more

Facebook Terrorist Propaganda

Author(s):

Ed Alcantara, Chief Cyber Intelligence Officer, BLACKOPS Cyber

thumbs down facebook darknet terrorism terrorist propaganda

Facebook, WhatsApp, YouTube, Google, Twitter, Telegram etc.. have all been alerted (for years) to the enormous amount of extremist propaganda found on their platforms, yet they aren’t compelled to proactively monitor their platforms. Recently,…

From the Summer 2015 Issue

A-ISAC Cooperating to Protect Our Skies

Author(s):

Faye Francy, Executive Director, Aviation Information Sharing and Analysis Center

The aviation sector plays such a critical role in the world economy that it has become an attractive target for a variety of malign actor groups. Each year, the air transportation system carries over 2.6 billion passengers and 48 million tons of freight, making it the world’s greatest source of international trade, tourism, and economic … Read more

From the Summer 2015 Issue

The Next Big Data Breach: Don’t Let It Be You!

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

Protection of information and data has always been one of the top priorities for organizations, governments, and businesses. For example, small restaurants have their “secret recipes” that set them apart from their competition. Larger organizations like Coca-Cola guard their product formulae and protect them like the Crown Jewels of England. On the government side, the … Read more

From the Summer 2015 Issue

Exploring Behavioral and Neuroscience Approaches to Cybersecurity: A Study of Phishing

Author(s):

Eric Reeves, Senior Manager, Lockheed Martin

The behavioral factors that contribute to users falling victim to phishing attacks include a lack of understanding of how computer systems work, lack of attention, and phishers’ increasingly sophisticated methods of visual deception.  Attacks on our computer systems continue to increase in frequency and sophistication. Organizations invest significant resources in the development of cyber protection … Read more