14/03/2011
Identifying ┬┤anonymous┬┤ email authors

A team of researchers from Concordia University has developed an effective new technique to determine the authorship of anonymous emails. Tests showed their method has a high level of accuracy – and unlike many other methods of ascertaining authorship, it can provide presentable evidence in courts of law. The new technique is profiled in a study published in Digital Investigation.

11/03/2011
Cyber-Security: International Controls and Standards

William Hague´s speech at the Munich Security Conference highlighted the importance of cyber-security in international relations, and raised questions of an appropriate international response to the increasingly viable threat.

04/03/2011
Sun Tzu and Cyber War

Cyberspace is a new warfare domain. Computers and the information they contain are prizes to be won during any military conflict. But the intangible nature of cyberspace can make victory, defeat, and battle damage difficult to calculate. Military leaders today are looking for a way to understand and manage this new threat to national security. The most influential military treatise in history is Sun Tzu‟s Art of War: its recommendations are flexible and have been adapted to new circumstancesfor over 2,500 years. This article examines whether Art of War is flexible enough to encompass cyber warfare. It concludes that Sun Tzu provides a useful but far from perfect framework for the management of cyber war, and urges modern military strategists to consider the distinctive aspects of the cyber battlefield.

26/02/2011
German and Dutch national Cyber Security Strategies released

The German and Dutch Governments have announced the release of their National Cyber Security Strategy to ensure secure operation of communications networks for the State, business and citizens.

22/02/2011
Cybersecurity and Internet Freedom Act of 2011

A bipartisan group of lawmakers on Thursday unveiled comprehensive cybersecurity legislation that includes provisions to improve the recruitment and retention of the federal cyber workforce.


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |