Your Ad Here

Friday, September 14, 2018

Cyberwar Season 1 – Episode 3: Cyber Mercenaries



Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.
Hey everyone I am on the third episode of “Cyberwar” hosted by Ben Makuch (@BMakuch) a national security reporter that travels the world to meet with hackers, government officials, and dissidents to investigate the ecosystem of cyberwarfare. They have been really entertaining and educational about the events and issues in information security and digital privacy on a global level.
Episode 1 looked at Anonymous
Episode 2 looked at The Sony Hack

Cyberwar Season 1 – Episode 2: The Sony Hack


Cyberwar Season 1 – Episode 2: The Sony Hack - https://www.securityorb.com/hack/cyberwar-season-1-episode-2-the-sony-hack/

So, I am on my second episode of “Cyberwar” hosted by Ben Makuch (@BMakuch) a national security reporter. Cyberwar is a show where Ben travels the world to meet with hackers, government officials, and dissidents to investigate the ecosystem of cyberwarfare.
The first episode looked into the decentralized group of international activist hackers known as “Anonymous” while episode 2 explores The Sony Hack.  At that time (2014) the Sony Hack was one of the worst attacks against a corporation.  Not only were embarrassing emails released, personal health records of employees and their family and social security numbers to name a few were dumped.  North Korea was named the culprit and many people assumed it was due to an upcoming release of a movie titled ‘The Interview” about the assassination of the North Korea leader.

Cyberwar Season 1 – Episode 1 Recap: Who is Anonymous?



I started watching a very interesting program titled “Cyberwar” hosted by Ben Makuch (@BMakuch) who is a national security reporter. The show is described as:
Ben Makuch travels the world to meet with hackers, government officials, and dissidents to investigate the ecosystem of cyberwarfare.
The first episode looked into the decentralized group of international activist hackers known as “Anonymous” which has been linked to numerous high-profile incidents over the years, including Internet attacks on governments, major corporations, financial institutions and religious groups.  A trademark for the online hacktivist group is a person wearing a Guy Fawkes mask.

A Book Review of "Practical Cyber Intelligence" by Wilson Bautista Jr.

A Book Review of "Practical Cyber Intelligence" by Wilson Bautista Jr. - https://www.securityorb.com/featured/book-review-of-practical-cyber-intelligence-by-wilson-bautista-jr/

Packt Publishing, in 2018 released “Practical Cyber Intelligence” by Wilson Bautista Jr. a retired military officer who holds the position of Director of IT and InfoSec at i3 Microsystems.

I found this book to be very informative, easy to read as well as easy to follow once I engaged it.  One of the key aspects that captured my attention pertained to the vital information and moreover the perspective into information security that is rarely discussed or examined in recent offerings.  As a practitioner in the information security field, this book can serve as a handbook for team leads, managers, directors and CISOs responsible for securing organizational assets. As an educator of information security, this book can serve as a key role in courses dealing with in the management of information security as a possible text, but definitely as supplemental reading text.