Posts By Bob Gourley

Cybersecurity Week at the House, Further Drone Hacking Claims by Iran, and More

Here is today’s federal cybersecurity and information technology news: The House of Representatives will begin discussing four cybersecurity bills this week but will not consider the Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness (PRECISE) Act of 2011 . More here. The National Institute of Standards and Technology (NIST) has proposed changes to the DigitalRead… Read more »

Cyber War and the Expanding Definition of War

Editor’s note: This post by Sean Lawson provides context on cyber conflict, an area of interest at the nexus of national security and technology. – bg Recently, Dr. Thomas Rid of the War Studies department of King’s College in London published an article in the Journal of Strategic Studies titled, “Cyber War Will Not TakeRead… Read more »

Kapow’s ETL for HTML offerings

Today’s data isn’t just in one warehouse nor is it in one format. Data is no longer silo’ed in perfectly structured relational databases, but rather unstructured across the broader internet. Thus, traditional ETL (Extract, Transform, Load) architectures do not apply. Less than 1% of all web data is available via API, and extraction tools mustRead… Read more »

CTO Security Report

Anonymous (Photo credit: Schuilr) 3 Million Iranian Bank Accounts Disclosed Iranian ATM’s are dispensing PIN and Password changes instead of money this week following the public disclosure of three million bank account details by an Iranian security researcher. While the disclosure of these accounts is unfortunate, what is more troubling is the process that ledRead… Read more »

Full Spectrum Cyber, Social Engineering Against Industrial Control Systems, and More

Today’s federal cybersecurity and IT news: Maj. Gen. Suzanne Vautrinot, commander the 24th Air Force and Air Force’s Cyber Air Component to USCYBERCOM emphasized the importance of “full-spectrum” cybersecurity that prepares for offense, defense and exploitation. More here. The U.S. Cyber Emergency Response Team warned of social engineering attacks against utilities’ industrial control systems byRead… Read more »

New Social Media Site TwitChimp.com Announces New Search and Discovery Features

TwitChimp.com is a new capability designed to help make Twitter better serve several niches of the community. TwitChimp makes it easy for experts on any topic to create curated lists of Twitter accounts to follow. These lists are then made easy to discover, which helps those seeking producers of relevant content. Although Twitchimp is stillRead… Read more »

Red Sky Alliance and Collaborative Cyber Sharing: It’s good to give, but it’s better to receive!

Editor’s note: This guest post from JeffStutzman of the Red Sky Alliance provides context on a topic of tremendous interest in the community, collaborative cyber security information sharing. – bg Government sponsored hackers, advanced cyber criminals, and even unskilled hactivists operate with relative ease against our information systems because of the sophistication of new toolsRead… Read more »

The PRECISE Act, Law Enforcement Data Exchange, and More

Today’s federal cybersecurity and IT news: The Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act of 2011 (The PRECISE Act) passed the House Homeland Security Committee though members had concerns over whether it was sufficient. More here. The Department of Homeland Security and Department of Justice discussed information sharing through N-DEx, the FBI’s nationalRead… Read more »

Terrorism Research Center Reconstitutes as Non-Profit Organization

I took great pleasure in reading the release below regarding the reconstitution of the Terrorism Research Center. The founders of the Terrorism Research Center (Matthew Devost, Brian Houghton, and Neal Pollard) are all highly regarded national security professionals and thought leaders who bring years of proven past performance to helping the nation think through someRead… Read more »