The Interpreter. Alfredo Passos. CI Worldwide. Cooperative Intelligence. Eric Garland. Proactive Intelligence. AllAnalytics. AllformZ. Aurora WDC. Business Intelligence. Business Intelligence and Cultural Transformation. Business Intelligence Notes for SAS Users. Chris Webb BI Blog. Kasper deJonge. Technosocial. Canal Blog. Darknet. INSA Cyber Intelligence Blog. Contributors All blog contributors are members of the Cyber Intelligence Task Force, though some guest submissions may be solicited by task force members.
If you would be interested in becoming a contributor or submitting a guest post, INSA encourages you to consider an individual INSA membership. Infowar Monitor. SenseCy. NedForum. Ponemon. We are pleased to let you know about our latest study on intelligence sharing.
The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way reveals interesting trends in how organizations are participating in initiatives or programs for exchanging threat intelligence with peers, industry groups, IT vendors and government. According to the 692 IT and IT security practitioners surveyed, there is more recognition that the exchange of threat intelligence can improve an organization’s security posture and situational awareness. However, concerns about trust in the sources of intelligence and timeliness of the information continue to be a deterrent to participation in such initiatives. Forty-seven percent of respondents say their organization had a material security breach that involved an attack that compromised the networks or enterprise systems.
Recorded Future. Skating on Stilts. TaoSecurity. ThreatStream. To Inform is to Influence. Tripwire: The State of Security. VeraCode. WIRED Security. Cyveillance. TrendLabs. Software Engineering Institute: Carnegie Mellon. Posted on by Troy Townsend in Cyber-physical Systems The majority of research in cyber security focuses on incident response or network defense, either trying to keep the bad guys out or facilitating the isolation and clean-up when a computer is compromised.
It's hard to find a technology website that's not touting articles on fielding better firewalls, patching operating systems, updating anti-virus signatures, and a slew of other technologies to help detect or block malicious actors from getting on your network. What's missing from this picture is a proactive understanding of who the threats are and how they intend to use the cyber domain to get what they want.
Earlier this year, representatives from the government approached the SEI Emerging Technology Centerabout conducting research to assess the state of the practice of cyber intelligence. Specifically, we were asked us to accomplish three core tasks: iRevolutions. Dirk's Weblog. Blogs of War. International Journal of Intelligence Ethics. Matthew Aid. The Mazz-INT Blog. Lawfare Blog. Best Defense. Click Here to Subscribe to FP Premium for 50% Off An Over $400 a Year Value for Just $4.99 per month!
In addition to the benefits of FP All Access » (unlimited articles and newsletters, custom alerts and access to the digital edition of the magazine — $59.99 a year value), that have won worldwide acclaim and an audience of millions for Foreign Policy, FP Premium subscribers receive: Exclusive never before available access to the FP Print Archive ($99 per year value) — Search and browse 45 years of award-winning FP content. 50% off attendance at FP's signature events, including the Top 100 Global Thinkers Gala and Day Long Global Solutions Roundtable and FP's Diplomat of the Year Dinner.
War on the Rocks. Sign in to War on the Rocks or create an account Sign in with Facebook Sign in with Google Sign in with Twitter Sign in with LinkedIn Sign in or sign up with email Login Remember me.
The XX Committee. War Is Boring. H I Sutton - Covert Shores. Intel News. Intelligence Ethics. Inglorious Amateurs. JIOX. My Bots Weblog. Selected Wisdom. Association of Former Intelligence Officers. Dark Matters. Endgame. Krebs on Security. RSA: Speaking of Security. Stratfor. Sources And Methods: New Wikipedia Articles Of Interest To Intelligence Professionals. Despite its occasional weaknesses, I really like Wikipedia.
Others (perhaps unnecessarily) worry about an encyclopedia that is editable by anyone. Whether you like it or not, however, it is undeniably the tertiary source of first resort for most of the planet. One of the things that has always bothered me about it, though, is the generally poor coverage of issues related to intelligence. From intelligence history to intelligence theory, Wikipedia, in my opinion, needs help.That is why, instead of traditional writing assignments in some of my classes, I like to task students to write Wikipedia articles about intelligence issues that have not already been covered.
This kind of assignment has a variety of educational benefits. Red Team Journal. Informations Dissémination. The Confidential Resource. Dart-Throwing Chimp. Leksika. Alephinsight Blog. Platform for WKSH8533A: Geospatial Tools for Nonproliferation Analysis (1 Credit) Welcome!
For the first day of class, please complete these tasks. Here is the syllabus for your review. You will find these recommended readings helpful as well. Frank V. Pabian, Commercial Satellite Imagery: Another Tool in the Nonproliferation Verification and Monitoring Tool-Kit, chapter 12 in the Nuclear Safeguards, Security and Nonproliferation Textbook, 2008.
Covert Contact. Carrying the Gun. Secrecy News (Federation of American Scientists) The number of chronically homeless persons in the U.S. dropped from more than 120,000 in 2008 to around 84,000 in 2014, a new report from the Congressional Research Service notes.
The federal government has undertaken to end chronic homelessness by 2017. “One of the reasons that federal programs have devoted resources to ending chronic homelessness […] Arms Control Wonk. The Military Leader. Breaking Defense. US Naval Intelligence Blog. All Things Counterterrorism. Global Guerrillas. Tesla's autopilot went live a couple of weeks ago (it's one of the first car brands to do this).
Unlike the autopilots and cruise controls of the past, it's an autonomous system. This means it isn't limited to the capabilities you get when you pop it out of the box. The Crime Analyst Hotspot. The Director's Desk. Those who know me, even in passing, generally realize that I'm interested in technology.
Probably because this is so well known, I am often asked to serve on advisory groups, committees, and such when the issue at hand is technological. In reality, my reputation exceeds me, but nevertheless, it has stuck. Tactics of Terror - Tapestri. Jihadology. Jihadica. PAX Sims. Syria Comment. Barents Observer.