29/08/2011
Command and Control of Cyberspace Forces

I would like to signal two really interesting reports about Command & Control forces and operations in cyberspace.

22/08/2011
Czech Cyber Security Strategy

The Czech Republic released its Cyber Security Strategy for the 2011-2015 period.

03/08/2011
Australian’s "Strategies to Mitigate Targeted Cyber Intrusions"

In contrast to the high-level U.S. cyberstrategy document, the Australian DoD’s "Strategies to Mitigate Targeted Cyber Intrusions" plan is detailed, well-researched and supported, and focused on proactively solving security problems rather than blindly reinforcing outdated and ineffective strategies.

03/08/2011
McAfee reveals "Operation Shady RAT"

For at least five years, a high-level hacking campaign — named "Operation Shady RAT" — has infiltrated the computer tems of national governments, global corporations, no-profits, and other organizations, with more than 70 victims in 14 countries.

01/08/2011
Le mancanze nella "DoD Strategy for Operating in Cyberspace"

Nelle ultime ore ho fatto un pò mente locale sullo stato dello sviluppo del pensiero americano in materia di strategia nel cyber-spazio, sintetizzando e schematizzando - a futura mia/vostra memoria - quali siano allo stato attuale le questioni critiche a cui la versione declassificata della "Department of Defense Strategy for Operating in Cyberspace" non ha risposto.


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |  60 |