Kevin G. Coleman

 

Posts by Kevin G. Coleman

COMMENTARY:
The death of Osama bin Laden has brought new threats of retaliatory strikes–including threats in cyber space.

Al Qaeda has called upon lone-wolf terrorists to launch attacks against Britain and the West. Not only are they calling for traditional acts of terror but also for what they have termed a “cyber jihad.” Keep reading →

COMMENTARY:
When it comes to cybersecurity and assurance measures designed to protect sensitive digital assets few people would argue that the risks of attack and compromise has increased sharply over the past few years.

For example, computer security giant McAfee released their 2010 Q3 Threats Report and in it they reported that on average 60,000 new malware threats were identified each day. In their 2011 Q1 Threat Report 6 million unique pieces of malware were recorded. This was the most active quarter in malware history. These figures clearly indicate the severity of the current cyber threat. Keep reading →

COMMENTARY:
The phone hacking scandal in Britain has captured the attention of millions around the world and continues to expand rapidly, with implications now for Scotland Yard and no apparent end in sight.

One knowledgeable source we know said “The ripples that are just now hitting the shores in the U.S. are likely to turn into a tsunami.” Keep reading →

COMMENTARY:
Many cybersecurity professionals and military strategists have anxiously awaited the public version of the Department of Defense’s Cyber Operations Strategy and on July 14 the wait ended when DoD released the 13 page document.

The document follows much of what has been talked about or insinuated in discussions that have taken place in the not so distant past. It breaks down the strategy into five distinct stratagems and initiatives that frame DoD’s operational intent. Keep reading →

The world has become addicted to the Internet and all its vast expanse has to offer. Experts have forecast that in 2014 there will be upwards of 2.5 billion devices connected to the Internet.

Whether you access it via a desktop, laptop, tablet, smartphone, game console or other device the socializing, services and content has addicted all of us. This addiction is why criminals, activists, terrorists and rogue nation states have turned the Internet into a weapon. Keep reading →

Page 8 of 81...45678