You can tell the players without a
scorecard... And doesn't that make them a legitimate drone target?
Perhaps we could issue bubble-gum cards of the big players?
Chinese
Army Unit Is Seen as Tied to Hacking Against U.S.
On the outskirts of Shanghai, in a
run-down neighborhood dominated by a 12-story white office tower,
sits a People’s Liberation Army base for China’s growing corps of
cyberwarriors.
… An unusually detailed 60-page
study, to be released Tuesday by Mandiant, an American computer
security firm, tracks for the first time individual members of the
most sophisticated of the Chinese hacking groups — known to many of
its victims in the United States as “Comment Crew” or “Shanghai
Group” — to the doorstep of the military unit’s headquarters.
The firm was not able to place the hackers inside the 12-story
building, but makes a case there is no other plausible explanation
for why so many attacks come out of one comparatively small area.
… Other security firms that have
tracked “Comment Crew” say they also believe the group is
state-sponsored, and a recent classified National
Intelligence Estimate, issued as a consensus document for all 16
of the United States intelligence agencies, makes a strong case that
many of these hacking groups are either run by army officers or are
contractors working for commands like Unit 61398, according to
officials with knowledge of its classified content.
Please read this.
February 18, 2013
Deloitte
Tech Trends Poll: You’ve Been Hacked, Now What?
News
release: "More than one in four (28 percent) of respondents
surveyed report their organizations were the victims of at least one
cyberattack in the past year; nine percent report multiple breaches
and an alarming 17 percent were not confident that
their organizations could even detect an attack, according
to a Deloitte Tech Trends poll of 1,749 business professionals...
Based on the Feb. 7 Deloitte Dbriefs webcast “If You Build It, They
Will Come – And Try to Hack It,” the results of the poll
underscore the increasing importance of cyber intelligence
highlighted in the No
Such Thing as Hacker-proof chapter in Deloitte’s 4th Annual
Tech Trends Report, Elements
of postdigital."
Interesting. Many schools don't even
know they have a Business Model...
February 18, 2013
Moody's:
2013 outlook for entire US Higher Education sector changed to
negative
News release: "The 2013 outlook
for the entire US higher education sector is negative, including the
market-leading, research-driven colleges and universities, says
Moody's Investors Service in its annual industry outlook. Previously
Moody's had a stable outlook for these leading institutions and a
negative outlook for the rest of the sector since 2009. Moody's
perceives mounting fiscal pressure on all key university revenue
sources. "The US higher education sector has hit a critical
juncture in the evolution of its business model," says Eva
Bogaty, the Moody's Assistant Vice President -- Analyst who is the
lead author on the report US
Higher Education Outlook Negative in 2013. "Even
market-leading universities with diversified revenue streams are
facing diminished prospects for revenue growth." The rating
agency says that most universities will have to lower their cost
structures to achieve long-term financial sustainability and fund
future initiatives. Universities have been restraining costs in
response to the weak economic conditions since the 2008-2009
financial crisis, but they have only recently begun examining the
cost structure of their traditional business model."
Send this to your Security Manager and
anyone else who might be interested.
February 18, 2013
Security
Engineering -The Book, 2nd Ed. Free Online
Security
Engineering by Ross Anderson — The Book: "All chapters
from the second edition now available free online."
No comments:
Post a Comment