Page 92 - index
P. 92
http://thehill.com/policy/cybersecurity/225872-banks-release-cyber-info-sharing-software
Defense contractors fighting cyber threats can share information through new Information
Security and Analysis Center
http://www.al.com/business/index.ssf/2014/12/defense_contractors_fighting_c.html
Avoiding Data Breaches with Context Aware Behavioral Analytics
http://threatpost.com/avoiding-data-breaches-with-context-aware-behavioral-analytics/109679
Best practices in knowledge-based authentication
http://net-security.org/secworld.php?id=17715
Cybersecurity Seen as DoD Priority Under Carter
http://www.govinfosecurity.com/cybersecurity-seen-as-dod-priority-under-carter-a-7634
Inside the "wiper" malware that brought Sony Pictures to its knees [Update]
http://arstechnica.com/security/2014/12/inside-the-wiper-malware-that-brought-sony-pictures-to-
its-knees/
What is on the Pentagon Cyber Chief's Holiday Shopping List?
http://www.nextgov.com/cybersecurity/2014/12/what-pentagon-cyber-chiefs-holiday-shopping-
list/100539/
In surprise, Senate may bring up cyber bill
http://thehill.com/policy/cybersecurity/225994-senate-may-move-soon-on-cyber-bill
Judge: Give NSA unlimited access to digital data
http://www.pcworld.com/article/2855776/judge-give-nsa-unlimited-access-to-digital-data.html
Health insurance online threats revealed
http://net-security.org/secworld.php?id=17718
NH-ISAC Offers Cyber-Intelligence Tool
http://www.govinfosecurity.com/nh-isac-offers-cyber-intelligence-tool-a-7642
DOJ Launches New Cyber Unit, Claims Privacy is Mission Critical
http://threatpost.com/doj-launches-new-cyber-unit-claims-privacy-is-mission-critical/109732
Detecting the Insider Threat - how to find the needle in a haystack?
http://www.computerworld.com/article/2854636/security0/detecting-the-insider-threat-how-to-
find-the-needle-in-a-haystack.html
Lizard Squad performs a 'RIGHTEOUS' Sony HACK
http://www.computerworld.com/article/2856472/lizard-squad-performs-a-righteous-sony-hack-
92 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide