- The Strategist - https://www.aspistrategist.org.au -
Cyber wrap
Posted By Liam Nevill on September 7, 2016 @ 13:57
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-135/
[1] tone down discussion about any US response: http://www.washingtontimes.com/news/2016/sep/5/obama-says-he-doesnt-want-wild-west-cyberwar-russi/
[2] acknowledged: http://www.politico.com/story/2016/09/obama-russia-cyber-arms-race-227732
[3] proclivity for cyber espionage: http://www.independent.co.uk/news/world/asia/g20-british-officials-seduced-honeypot-spies-espionage-hacking-security-a7224326.html
[4] data centre operator GlobalSwitch: http://www.thetimes.co.uk/article/chinese-poised-for-5bn-swoop-on-cyber-hubs-h38r98dnr
[5] are reportedly concerned about the security implications: http://www.crn.com.au/news/global-switch-in-talks-with-potential-asian-buyers-436339
[6] Investigatory Powers Bill,: http://www.theregister.co.uk/2016/09/05/parliament_returns_for_the_snoopers_charter/
[7] has been criticised: http://www.computerworlduk.com/security/draft-investigatory-powers-bill-what-you-need-know-3629116/
[8] Anderson’s report was largely supportive of the Bill: http://www.theregister.co.uk/2016/08/19/bulk_powers_review_investigatory_powers_bill/
[9] Hong Kong government had been targeted: https://hacked.com/hong-kong-targeted-politically-motivated-chinese-hackers/
[10] Chamber of Commerce released a study called ‘Preventing Deglobalisation’: http://thehill.com/policy/cybersecurity/294315-us-chamber-cybersecurity-laws-might-cost-china-others-trillions
[11] blog for Oxford University Press: http://blog.oup.com/2016/09/israel-military-cyber-space/
[12] consider developing an offensive cyber capability: https://www.thestar.com/news/canada/2016/09/01/former-electronic-spy-chief-urges-ottawa-to-prepare-for-cyber-war.html
[13] Hillary Clinton has told the American Legion in Cincinnati: https://techcrunch.com/2016/09/06/obama-clinton-cyber-warfare/
[14] raised some concerns: https://www.lawfareblog.com/developing-loud-cyber-weapons
[15] history of offensive cyber capabilities: http://www.zdnet.com/article/understanding-the-military-buildup-of-offensive-cyberweapons/
[16] major international cyber exercises: http://www.techrepublic.com/article/governments-and-nation-states-are-now-officially-training-for-cyberwarfare-an-inside-look/
[17] more attempts to hack its network: http://www.reuters.com/article/us-cyber-heist-swift-idUSKCN11600C
[18] that cyber criminals are continually evolving their tactics, techniques and procedures: http://www.cso.com.au/article/606246/fbi-perspective-status-evolution-global-cybercrime-trend-micro-cloudsec-2016/
[19] found that technical skills in intrusion detection, software development and attack mitigation were in short supply in Australia: http://www.cio.com.au/article/606319/australia-hardest-hit-globally-by-cyber-security-skills-shortage-report/