Part 1: Existential Cyber Threats and Risk of a Destabilized World
Part 3: The Cyber NGO â€“ A Third Sphere Model - An answer to the question: What is a Public-Private Partnership for cyber?
Part 2: If Cyber is Existential: Fix the Cyber Market Dysfunction
iOS 9.3 and EMM:
5 New Features That Will Matter to You
External Threats and Internal Risks:
MobileIron's first quarterly mobile security and risk review.
Some new data available on the use of botnets for DDoS attacks.
Botnets are an insidious fact of the modern Internet. Botnets are groups of computers from all around the world that have been infected through some form of malware which, after infection, respond to instructions from a remote computer. They are used by cyber criminals to launch distributed denial of service (DDoS) attacks, to generate spam, and to execute a wide variety of other exploits. On January 13, 2012 The Hacker News reported that Microsoft launched a real-time, hosted, threat intelligence feed that tracks the status of botnets that are creating havoc on the Internet. Yesterday, Kaspersky Labs issued a short slideshare that summarizes the botnet statistics for their use in DDoS attacks in 2014.