Newly released NSA slides explain mechanics of US surveillance

In the latest revelations of the NSA leaks scandal, new slides have emerged thoroughly explaining the targeting process of the US government top-secret PRISM program deployed to spy on communication data of targets operating abroad.
The price of truth

Are American public servants, civilian or military, who face a minimum of 30 years in prison for revealing U.S. state secrets to the press, “whistleblowers” exercising power in a democratic system or are they “resistors to oppression” at the hands of a military-police dictatorship?
Top 5 information security failures that can cripple a small businesses

We recently saw some government statistics which unfortunately underline that information security is becoming more and more of a challenge for small businesses.
SANS Brings World-Class Information Security Training to Las Vegas

ANS today announced the addition of new training courses to SANS Network Security 2013, in Las Vegas, NV, September 14-23.
Here is the List of 19 Countries Where Edward Snowden Has Requested Asylum

The anti-secrecy non-profit organisation Wikileaks which publishes secret information, news leaks, and classified media from anonymous sources has published an application request that provides the readers an update on Snowden’s asylum process and also shows list of 19 new countries where NSA’s whistleblower may request for asylum.
Web apps still a cause for concern according to Context Information Security

The third annual Web Application Vulnerability Report from Context Information Security shows that despite increased awareness and understanding of web application security, the level of vulnerabilities in web apps remains largely unchanged.
Most FTSE 350 companies have not acted on or even viewed Government’s cyber security guidance

Almost half (47%) of the company secretaries at the 53 FTSE 350 businesses that responded to the survey said their board had not discussed the Government’s guidance, whilst a further 28% said that their board had not seen it.
Phishing surge shows human element weakest link in cyber-defense

Although the key part of the term “cyber-security” is certainly the “cyber” portion, Kaspersky Lab’s David Emm argues that the human element of infosecurity is perhaps the most important.
Encryption expert talks about NSA’s PRISM surveillance program, data mining

Matthew Green, an assistant professor in the Department of Computer Science and the Information Security Institute at Johns Hopkins, is an expert in encryption.
U.S. Marine general may have been the source of the Stuxnet leak

A retired U.S. Marine general is being probed as the person responsible for leaking details about Stuxnet to The New York Times, according to a published report.