"cyberwarfare" entries

Business-government ties complicate cyber security

"Inside Cyber Warfare" author Jeffrey Carr discusses current security trends.

Is an attack on a U.S. business' network an attack on the U.S. itself? "Inside Cyber Warfare" author Jeffrey Carr discusses the intermingling of corporate and government interests in this interview.

Why cloud services are a tempting target for attackers

Jeffrey Carr on the significant and escalating risks of hosting data with cloud providers.

Before organizations embrace the efficiencies and cost savings of cloud services, they should also closely consider the security repercussions and liabilities attached to the cloud.

Four short links: 24 August 2011

Four short links: 24 August 2011

STM in Python, Static Web is Back, Cyberwar, and Virtual Language Education

  1. STM in PyPy — a proposal to add software transactional memory to the all-Python Python interpreter as a way of simplifying concurrent programming. I first learned about STM from Haskell’s Simon Peyton-Jones at OSCON. (via Nelson Minar)
  2. Werner Vogels’ Static Web Site on S3 — nice writeup of the toolchain to publish a web site to static files served from S3.
  3. China Inadvertently Reveals State-Sponsored Hacking — if UK, US, France, Israel, or Chinese citizens believe their government doesn’t have malware and penetration teams working on extracting information from foreign governments, they’re dreaming.
  4. MyChinese360 — virtual foreign language instruction in Mandarin, including “virtual visits” to Chinese landmarks. The ability to get native speakers virtually into the classroom makes the Internet a huge asset for rural schools. (via Lucy Gray)

Trend to watch: Formal relationships between governments and hackers

Cyber security expert Jeffrey Carr on the rise of government-sanctioned hackers.

Over the next year, cyber security expert Jeffrey Carr expects to see governments enlist civilians in organized cyber militias — and some countries will do this in plan and public view.