Tuesday, February 19, 2013

You can tell the players without a scorecard... And doesn't that make them a legitimate drone target? Perhaps we could issue bubble-gum cards of the big players?
Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyberwarriors.
… An unusually detailed 60-page study, to be released Tuesday by Mandiant, an American computer security firm, tracks for the first time individual members of the most sophisticated of the Chinese hacking groups — known to many of its victims in the United States as “Comment Crew” or “Shanghai Group” — to the doorstep of the military unit’s headquarters. The firm was not able to place the hackers inside the 12-story building, but makes a case there is no other plausible explanation for why so many attacks come out of one comparatively small area.
… Other security firms that have tracked “Comment Crew” say they also believe the group is state-sponsored, and a recent classified National Intelligence Estimate, issued as a consensus document for all 16 of the United States intelligence agencies, makes a strong case that many of these hacking groups are either run by army officers or are contractors working for commands like Unit 61398, according to officials with knowledge of its classified content.


Please read this.
February 18, 2013
Deloitte Tech Trends Poll: You’ve Been Hacked, Now What?
News release: "More than one in four (28 percent) of respondents surveyed report their organizations were the victims of at least one cyberattack in the past year; nine percent report multiple breaches and an alarming 17 percent were not confident that their organizations could even detect an attack, according to a Deloitte Tech Trends poll of 1,749 business professionals... Based on the Feb. 7 Deloitte Dbriefs webcast “If You Build It, They Will Come – And Try to Hack It,” the results of the poll underscore the increasing importance of cyber intelligence highlighted in the No Such Thing as Hacker-proof chapter in Deloitte’s 4th Annual Tech Trends Report, Elements of postdigital."


Interesting. Many schools don't even know they have a Business Model...
February 18, 2013
Moody's: 2013 outlook for entire US Higher Education sector changed to negative
News release: "The 2013 outlook for the entire US higher education sector is negative, including the market-leading, research-driven colleges and universities, says Moody's Investors Service in its annual industry outlook. Previously Moody's had a stable outlook for these leading institutions and a negative outlook for the rest of the sector since 2009. Moody's perceives mounting fiscal pressure on all key university revenue sources. "The US higher education sector has hit a critical juncture in the evolution of its business model," says Eva Bogaty, the Moody's Assistant Vice President -- Analyst who is the lead author on the report US Higher Education Outlook Negative in 2013. "Even market-leading universities with diversified revenue streams are facing diminished prospects for revenue growth." The rating agency says that most universities will have to lower their cost structures to achieve long-term financial sustainability and fund future initiatives. Universities have been restraining costs in response to the weak economic conditions since the 2008-2009 financial crisis, but they have only recently begun examining the cost structure of their traditional business model."


Send this to your Security Manager and anyone else who might be interested.
February 18, 2013
Security Engineering -The Book, 2nd Ed. Free Online
Security Engineering by Ross Anderson — The Book: "All chapters from the second edition now available free online."

No comments: