Articles

Articles on CyberSecurity and related topics. The articles are transient and are periodically removed and replaced when they are no longer current. They reflect current thinking on interesting topics.

Magazines published periodically which are CyberSecurity relevant are listed under Magazines. Each magazine has one or more relevant articles, and the magazine home page often provides a means to get access to archival copies.

This is your site and the management appreciates your comments. If you see or write an article of interest that you would like to share, please forward it to us.

News & Articles
Articles
Introductory Information Protection
An Introduction to Machine Learning for Cybersecurity and Threat Hunting
Harvard Business Review: The Future of Cybersecurity
News Sources
CNBC: CyberSecurity
CyberSecuirty News
Cyber Policy Magazine
Cyber Security Newscast
Cyber Security Review
Entrepreneur: CyberSecurity
Homeland Security News Wire
Info Security Magazine
ISACA: The Nexus Articles
Oxford: Journal of Cybersecurity
Network World
Reuters: Cybersecurity
Secuirty Magazine
Security Week
Tech News World
The Cyber Security Source
The Hacker News
threat post
U.S. News: Cybersecurity
UCSD: The Top CyberSecurity Websites of 2017</td.
US+CERT: Alerts
US-CERT: Current Activity
US-CERT: Security Tips
News Articles
06/27/2017 The Dark Web: The Land of Hidden Services
   RFC 7686: The “.onion” Special-Use Domain Name
   RFC 6761: Special-Use Domain Names
08/05/2017 Microsoft Security Bulletin: Wannacry
08/05/2017 DHS Statement by Secretary Johnson Concerning the Deployment of Einstein 3A
08/05/2017 DHS Statement on Wannacry
07/25/2017 Public Workshop – Cybersecurity of Medical Devices: A Regulatory Science Gap Analysis, May 18-19, 2017
07/01/2017 2017 Biggest CyberSecurity Threats
07/01/2017 ABA: Law firms must manage cybersecurity risks
07/01/2017 American Scientist: Cybersecurity Is Harder Than Building Bridges
07/01/2017 Cyber Threat Definitions
07/01/2017 Cyber Threat Source Descriptions
07/01/2017 Cyber-warfare: Hype or fear
07/01/2017 Cyber-warfare ‘is growing threat’
07/01/2017 CyberWire
07/01/2017 DHS: Combating Cyber Crime
07/01/2017 FBI: Cyber Crime
07/01/2017 FBI Law Enforcement Bulletin Cyber Terror
07/01/2017 Lentis/Cyberterrorism and Cyberwarfare
07/01/2017 New leak suggests NSA penetrated Mideast banking networks
07/01/2017 HDBaseT Alliance, Valens and Check Point Join Forces to Provide Superior Automotive Cyber Security
07/01/2017 NOVA: CyberWar
07/01/2017 Russia’s risky strategy for recruiting hackers is also incredibly effective — and the US is lagging behind
07/01/2017 Schneier:: Essays in the Category “Cyberwar and Cyberterrorism”
07/01/2017 Tripware: The State of Security
07/01/2017 USA Today: Protecting your cybersecurity in 2017
07/01/2017 When Is a Cybercrime an Act of Cyberwar?
07/01/2017 Why Cryptography is Harder than it Looks (Schneier)
07/01/2017 Ransomware Starter Toolset
02/21/2017 Global surveillance disclosures (2013–present)
11/04/2016 UDP-Based Amplification Attacks
09/00/2016 Air Force cyber-power targeting theory
08/13/2016 NIST Digital Authentication Guideline
08/13/2016 Malicious Email Mitigation
08/13/2016 NIST SMS Two-Factor Authentication Issues
05/27/2016 Who’s Using Cyberthreat Intelligence and How?
05/27/2016 Threats From Within
05/24/2016 Someone Hacked the Hackers: 500K Accounts Leaked Online
05/24/2016 Firms Have 200+ Unencrypted ‘Password’ Files in OneDrive
05/24/2016 Security Remains Prime Barrier to Cloud Adoption
05/20/2016 Vulnerabilities Found in Siemens SIPROTEC Protection Relays
05/11/2016 IBM’s Watson takes on CyberSecurity
05/02/2016 Vulnerability Summary
04/29/2016 Password Cracking
04/28/2016 The Weekly Cybrarian