• Home
  • Blog
  • About
  • Contact
CloudAve
Software in Business. The Business of Software.
  • Business
    • Analysis
    • Entrepreneurship
    • Marketing
    • Strategy
    • Small business
  • Technology
    • Application Software
    • Infrastructure
    • Open Source
    • Mobile
    • Platforms
    • Product reviews
    • Security
  • Misc
    • Design
    • Just for fun
    • Trends & Concepts
  • Your POV
  • Sponsors
Browse: Home / Cyberwarfare

Cyberwarfare

Will Obama's Cyber Warfare Policy Backfire?

Will Obama’s Cyber Warfare Policy Backfire?

By Dan Morrill on March 14, 2013

Jason Healey, director of the Cyber Statecraft Initiative at the Atlantic Council brings up an interesting thought about how diplomacy is shaping how we view cyber warfare. In an article over on usnews.com Mr. Healey brings up some interesting points about how we are approaching cyber warfare using a two-pronged approach. One approach is to […]

Posted in Featured Posts, Security | Tagged china, Cyberwarfare, iran, Stuxnet | 1 Response

Mandiant and APT1 cyber warfare espionage

Mandiant and APT1 cyber warfare espionage

By Dan Morrill on February 20, 2013

Hey wait, if we have screen video of hackers doing their work, doesn’t that mean we penetrated the hackers methods, processes, and other information resources? Sometimes I don’t think we are thinking clearly enough, as the fear mongering escalates for cyber warfare, and how we are all going to go through an electronic pearl harbour, […]

Posted in Security | Tagged china, Cyberwarfare, Mandiant

Understanding Shodan HQ for hacking and cyber warfare

Understanding Shodan HQ for hacking and cyber warfare

By Dan Morrill on January 17, 2013

Understanding Shodan HQ for hacking and cyber warfare Shodan HQ is probably one of the more interesting web sites that few people know about. Shodan scans the internet looking for devices that people have left unsecured or with default if any login information. Sometimes a web site just makes you happy, and Shodan has shown […]

Posted in Security | Tagged Cyberwarfare, information security, SCADA, Security, Shodan

feed mail facebook twitter linkedin

Sponsor Posts

    No feed items found.

    No feed items found.

Cloud Tweets

Tweets from @ZoliErdos/cloudave-widget

Popular Posts

  • Home
  • The Five-Step Maturity Model for Building a Collaborative Organization
  • SaaS v. On-premises Software: Which One is More Green?
  • The concerns of Social Enterprise
  • 10 Critical Requirements for Cloud Applications
  • Collecting and analyzing jobs-to-be-done
  • Model for Employee Innovation: Amazon Prime Case Study
  • OpenDNS? Google DNS? Comcast? Surprising Results.

Archives

Authors

  • Adron Hall
  • Chirag Mehta
  • Christian Reilly
  • Dan Morrill
  • Derek Pilling
  • Hutch Carpenter
  • Jarret Pazahanick
  • Jason M. Lemkin
  • Joel York
  • John Taschek
  • Krishnan Subramanian
  • Mark Suster
  • Michael Krigsman
  • Ofir Nachmani
  • Paul Miller
  • Quinton Wall
  • Randy Bias
  • Robert Duffner
  • Sadagopan
  • wprss
  • Zoli Erdos
Sponsored by: