Page 3 - CDM Cyber Warnings February 2014
P. 3
Foreword - Hugh Thompson ........................................................................................................................2 - 3 Cyber Defense Magazine (CDM) is distributed electronically via opt-in
Email, HTML, PDF and Online Flipbook formats. All electronic
Obtaining Greater Security Intelligence .......................................................................................................5 - 7 editions are available for FREE, always. No strings attached. A limited
number of print editions are available on a subscription basis and
At Risk - Top 5 Threats To Server Infrastructure ......................................................................................8 - 11 distributed at the RSA Conference 2014.
When Moving To The Public Cloud, Stay In Control ..............................................................................13 - 15 EXECUTIVE PRODUCER
The Rise Of Incident Response .................................................................................................................16 - 18 Gary S. Miliefsky, FMDHS, CISSP®
[email protected]
Hackers’ New Hide And Seek: Supply Chain Cyber-Attacks ...................................................................19 - 22
PRESIDENT
Defeating APTs By Stealing Back The Data .............................................................................................23 - 25
Stevin Victor
Cracking Crypto Is Not Shocking, But Living In A World Without Trust Is..........................................27 - 28 [email protected]
Proactive Homeland Security?..................................................................................................................29 - 34 EDITOR-IN-CHIEF
How To Select The Right Cyber-Defense Against Targeted Attacks And APTs.....................................36 - 39 Pierluigi Paganini, CEH
[email protected]
Automation In Action: Proactively Hardening Systems Against Intrusion ...........................................40 - 44
ADVERTISING
Cyber Defense Awards 2014 ......................................................................................................................46 - 74
Jessica Quinn
Five Horsemen Of The Cyber Apocalypse ................................................................................................75 - 78 [email protected]
Evolutionary Cyber Intel Experiment In Countering The Message ........................................................79 - 81 KEY WRITERS AND CONTRIBUTORS
Security Awareness Training: The Final Frontier In The Fight Against Cyber Crime ...........................82 - 85 Oded Horovitz
David Canellos
Why Is DDoS Such A Persistent Threat?..................................................................................................86 - 88 Tom Cross
Torsten George
Your Metadata: An Argument For Restraint And A Defense Of Privacy ...............................................89 - 90 Dr. Guy Bunker
Kevin Bocek
The Counterveillance Imperative .............................................................................................................91 - 93 Tony Perri
Gal Diskin
Security Predictions For 2014 ...................................................................................................................94 - 98 Michael Thelander
David Rosen
Information Security Innovator Of The Year ........................................................................................99 - 100 Jeff Bardin
Seth Goldhammer
Joe Ferrara
Dan Holden
Shawn Sweeney
Pierluigi Paganini
Patrick Rafter
Interested in writing for us:
[email protected]
CONTACT US:
Cyber Defense Magazine
Toll Free: +1-800-518-5248 x2001
Fax: +1-702-703-5505
SKYPE: cyber.defense
Email:
[email protected]
Magazine: www.cyberdefensemagazine.com
Copyright© 2014, Cyber Defense Magazine (CDM), a publication of
STEVEN G. SAMUELS LLC
848 N. Rainbow Blvd. #4496
Las Vegas, NV 89107 USA
EIN: 454-18-8465, DUNS# 078358935.
CYBER DEFENSE MAGAZINE - ANNUAL EDITION 3 All rights reserved worldwide.