Page 92 - index
P. 92







http://thehill.com/policy/cybersecurity/225872-banks-release-cyber-info-sharing-software

Defense contractors fighting cyber threats can share information through new Information
Security and Analysis Center
http://www.al.com/business/index.ssf/2014/12/defense_contractors_fighting_c.html

Avoiding Data Breaches with Context Aware Behavioral Analytics
http://threatpost.com/avoiding-data-breaches-with-context-aware-behavioral-analytics/109679

Best practices in knowledge-based authentication
http://net-security.org/secworld.php?id=17715

Cybersecurity Seen as DoD Priority Under Carter
http://www.govinfosecurity.com/cybersecurity-seen-as-dod-priority-under-carter-a-7634

Inside the "wiper" malware that brought Sony Pictures to its knees [Update]
http://arstechnica.com/security/2014/12/inside-the-wiper-malware-that-brought-sony-pictures-to-
its-knees/

What is on the Pentagon Cyber Chief's Holiday Shopping List?
http://www.nextgov.com/cybersecurity/2014/12/what-pentagon-cyber-chiefs-holiday-shopping-
list/100539/

In surprise, Senate may bring up cyber bill
http://thehill.com/policy/cybersecurity/225994-senate-may-move-soon-on-cyber-bill

Judge: Give NSA unlimited access to digital data
http://www.pcworld.com/article/2855776/judge-give-nsa-unlimited-access-to-digital-data.html

Health insurance online threats revealed
http://net-security.org/secworld.php?id=17718

NH-ISAC Offers Cyber-Intelligence Tool
http://www.govinfosecurity.com/nh-isac-offers-cyber-intelligence-tool-a-7642

DOJ Launches New Cyber Unit, Claims Privacy is Mission Critical
http://threatpost.com/doj-launches-new-cyber-unit-claims-privacy-is-mission-critical/109732

Detecting the Insider Threat - how to find the needle in a haystack?
http://www.computerworld.com/article/2854636/security0/detecting-the-insider-threat-how-to-
find-the-needle-in-a-haystack.html


Lizard Squad performs a 'RIGHTEOUS' Sony HACK
http://www.computerworld.com/article/2856472/lizard-squad-performs-a-righteous-sony-hack-

92 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   87   88   89   90   91   92   93   94   95   96   97