The ISAO Standards organization is holding an online seminar series on new and emerging issues that ISAOs are facing. This month’s session is scheduled for April 26th. The topic will be CISA Plus Confidentiality: How to Integrate Interdisciplinary Cyberlaw Support into an ISAO. Guest speaker Doug DePeppe, a cyberlaw practitioner with military and homeland security […]
Advertising and Sport: What if Advertising Revenue Dried Up? A Cascading Impact from the Methbot Operation?
Sports-ISAO, the information sharing leader for the sport sector, has been monitoring the Methbot operation. A series of articles from us will be published about the gravity of this massive fraud upon the sport, entertainment, media, advertising and Internet industries. This first article serves as a Call to Action to the Community of Sport to […]
THE THREE KEY STRATEGIC FINDINGS The Industry of Sport: Yet Another Institution of Society Targeted for Attack! Scanned, probed and targeted by cyberattackers, the Sports-ISAO observed hostile activity from the Internet as soon as the Olympics project was announced. Moreover, athletes, organizers, sponsors, and affiliated enterprises were all attacked. The publicity of the Olympic Games […]
BALTIMORE, MD (October 20, 2016) – Seven different statewide cyber communities today announced the creation of CyberUSA, a new national platform for collaboration in economic development and innovation, and plans to expand the effort to include 30 states within the first year. The announcement was made at the CyberMaryland 2016 Conference. CyberUSA, will be chaired […]
One of the best examples of how personal brands can go awry is the Laremy Tunsil story. His projected salary was $20.4 million going into the 2016 NFL Draft with a estimated signing bonus of $13.1 million. But his Twitter account was hacked 30 minutes before the draft and a photo of a person (alleged […]
The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat levels place more demands on security personnel and network administrators to protect information systems. Protecting the network infrastructure is critical to preserve the confidentiality, integrity, and availability of communication and services across an enterprise. […]