Cyber Security

Edward Snowden: the whistleblower behind the NSA surveillance revelations

Cyber Security, Governance
The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. More

Kenya: CCK Secures Cyberspace for Progressive Development

Cyber Security
The combination of telecommunication and information systems has come into one product, ICTs that dictates the direction of our lives. At this point in time, Kenya considers ICT as a bubble because the Jubilee government has adopted it as one of the engines of economic development. If this has to facilitate the government idea to see that ICT trickles down to all Kenyans and who use them in what has previously been referred to as a knowledge economy, then regulators for instance, the Communication Commission of Kenya (CCK) and information disseminators have a responsibility of drawing synergies from each other in order to coherence and provide the right direction for this services to be utilized by Kenyans. more
Why We Won’t Get International Cyberwarfare Standards

Why We Won’t Get International Cyberwarfare Standards

Cyber Security
ASA Risk Consultants added its voice this week to the slowly growing chorus of voices demanding a coordinated international response to cyberattacks. In a research note circulated by IDG, ASA asserts that "nations will need to come to an agreement on how cyber warfare should be handled." Nations should establish lasting peace and end world poverty, too. There's always something new for the to-do list. Don't hold your breath on any of these. Lurking in the background is a strategy issued by the White House in February on "Mitigating the Theft of U.S. Trade Secrets," which noted that "the pace of economic espionage and trade secret theft against U.S. corporations is accelerating" and announced "diplomatic engagements and meetings by senior Administration officials with governments of c...

Verisign: New gTLD Security and Stability Considerations

Cyber Security, Domains
Verisign have sent a letter to ICANN concerning New gTLD Security and Stability Considerations according to their Labs Technical Report   —The introduction of multitudes of new generic Top Level Domains (gTLDs) into the DNS (the Internet’s de facto name mapping system) will have far-reaching effects. Any party concerned with the issues of privacy, trust, confidence, or the overall security of the DNS after the addition of new gTLDs (either from the consumer or the operator perspective) is implic- itly depending on the Internet Corporation for Assigned Names and Numbers (ICANN) and the broader DNS community to appropriately address these issues before delegating any new gTLDs.   The risk of a misstep during the process of introducing new gTLDs to the global DNS could have

Cybersecurity for Small Business

Business, Cyber Security
The Internet allows businesses of all sizes and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether a business is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. Theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence. In October 2012, the FCC re-launched the Small Biz Cyber Planner 2.0, an online resource to help small businesses create customized cybersecurity plans. The FCC also released an updated one-page Cybersecurity Tip Sheet. The qui...