- The Strategist - https://www.aspistrategist.org.au -
Cyber wrap
Posted By Simon Hansen on March 12, 2014 @ 12:30
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-19/
[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg
[2] disclosed: http://www.baesystems.com/article/BAES_165734/bae-systems-applied-intelligence-unveils-extent-of-venomous-nature-of-%E2%80%98snake%E2%80%99-operation
[3] post: https://blog.gdatasoftware.com/blog/article/uroburos-deeper-travel-into-kernel-protection-mitigation.html
[4] New York Times : http://www.nytimes.com/2014/03/09/world/europe/suspicion-falls-on-russia-as-snake-cyberattacks-target-ukraines-government.html?_r=1
[5] Washington Post : http://www.washingtonpost.com/opinions/playing-by-putins-tactics/2014/03/09/b5233b90-a558-11e3-a5fa-55f0c77bf39c_story.html
[6] said: http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/russias-holding-back-cyber-capabilities-ukraine/80233/
[7] suggests: http://www.c4isrnet.com/article/M5/20140310/C4ISRNET18/303100011
[8] argue: http://www.aspistrategist.org.au/australia-and-cyberwar-time-for-a-measured-debate/
[9] argues: http://www.defenseone.com/technology/2014/03/when-does-cyber-spying-become-cyber-attack/80206/?oref=d-skybox?oref=d-interstitial-continue
[10] feature: http://harvardmagazine.com/2014/03/why-big-data-is-a-big-deal
[11] explores: http://www.aljazeera.com/indepth/opinion/2013/11/big-data-critical-ingredient-201311182144196723.html
[12] signing: http://www.futuregov.asia/articles/2014/mar/10/vietnam-cybersecurity-agency-signs-mou-microsoft/?utm_content=buffer7732c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[13] emphasised: http://www.defense.gov/pubs/2014_Quadrennial_Defense_Review.pdf
[14] US$5.1 billion: http://fcw.com/articles/2014/03/04/budget-defense.aspx?utm_content=buffered151&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[15] piece: http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/four-federal-cyber-escapades-follow-spring/79960/
[16] spoke: http://www.newyorker.com/online/blogs/johncassidy/2014/03/snowdens-solution-more-encryption-and-better-watchdogs.html
[17] presented: http://www.theguardian.com/technology/2014/mar/07/google-eric-schmidt-jared-cohen