Bayshore Networks Joins ICS-ISAC as Supporting Member

WASHINGTON, D.C. & NEW YORK, July 31, 2013 – The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) today announced that Bayshore Networks,
Syrian Electronic Army no longer just Twitter feed jackers… and that’s bad news

The Syrian Electronic Army is starting to pose a serious risk to enemies of the Assad regime in both Syria and further afield, according to security watchers.
Keep your laptop safe while using Wi-Fi hotspots

The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data.
Pinterest’s head of engineering outlines platform future; hints about API

Pinterest might come off to some as just another social network of digital boards teeming with frilly white dresses, gluten-free recipes, and tips for getting super-toned abs.
XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals
Que SARA, SARA: the Inevitability of Knowledge Sharing – an ICS-ISAC Public Briefing

Many in the industrial cybersecurity space have long pressed for faster action on the part of stakeholders. Over recent years, however, much of this emoting has seemed to fall on deaf ears.
Why the world’s governments are interested in creating hubs for open data

Amid the tech giants and eager startups that have camped out in East London’s trendy Shoreditch neighborhood, the Open Data Institute is the rare nonprofit on the block that talks about feel-good sorts of things like “triple-bottom line” and “social and environmental value.”
Defining Security Intelligence

Several years ago, Q1 Labs (now part of IBM Security) introduced the term “Security Intelligence” to describe the value organizations can gain from their security data by treating this information like they do the outputs produced from other business functions.