** Wed 21AUG ** Que SARA, SARA: the Inevitability of Knowledge Sharing – an ICS-ISAC Public Briefing

Many in the industrial cybersecurity space have long pressed for faster action on the part of stakeholders. Over recent years, however, much of this emoting has seemed to fall on deaf ears.
How BYOD can reduce operating costs

One aspect of BYOD that we don’t often talk about is its potential to reduce operating costs.
The cyber capabilities of Iran can hit US

Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country.
GCHQ Launches Twin-Track Approach to Cyber Incident Response Scheme

Following a pilot project aimed at providing UK government and business with an effective cyber incident response capability, GCHQ (in the form of CESG and CPNI) has launched two schemes
British Library’s wi-fi service blocks ‘violent’ Hamlet

A man using the British Library’s wi-fi network was denied access to an online version of Shakespeare’s Hamlet because the text contained “violent content”.
Trusteer white paper warns against escalating APT attacks

In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals
Zombie PCs are for crimelord chumps: Fear clusters, says infosec ace

It may be possible for a “single dedicated attacker” to run an internet “carpet-bombing” attack by applying Big Data and distributed computing technologies, security researcher Alejandro Caceres warns.
Encrypted email isn’t secure, but if you must use it, here are some Lavabit alternatives

Last week, FBI raids on Freedom Hosting and child porn distributors took down Tor Mail, a secure email provider for users of the Tor network.
China-based Intruders Use Fresh Attack Techniques Against Dissidents

The “Comment Crew,” a group of China-based hackers whose outing earlier this year in major media outlets caused a row with the U.S., have resumed their attacks against dissidents.
How much confidential info is left unprotected in SharePoint?

A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and governance measures