Close

Articles

2015/01/05[Contribution] “Who’s Afraid of Cybercrime? Law Enforcement Must Combat Cybercrime by Thinking and Acting Like a Cybercriminal” [by Erik Barnett, Attaché to the European Union – U.S. ICE Homeland Security Investigations]

Law enforcement has too often reacted to cybercrime by wringing its hands and lamenting the lack of technology, resources, and training to compete with sophisticated, savvy, and well-financed cybercriminals. The qualities of cybercriminals which cause so much anxiety in law enforcement can be categorized as “globalized,” “united,” and “complex.” In moments of extreme honesty, most…

Read More

2015/01/05[Contribution] Whitenoise, Dynamic Identity Verification and Authentication and Dynamic Distributed Key Infrastructures [by André Jacques Brisson, Whitenoise Laboratories Canada Inc]

ABSTRACT Dynamic Identity Verification and Authentication (DIVA) secure communications for all networks through the cloud and create secure virtual networks within the cloud. DIVA is a secure protocol that prevents all cyber security and identity theft attacks by demanding proof of identity at the time of network access and throughout the network session. It assigns…

Read More

2014/12/23Are you ready for the next attack? [By Symantec]

According to Darwin, “It is not the strongest of the species that survives. It is the one that is most adaptable to change”. The landscape of threats on the Internet is constantly changing, and so are the necessary technological responses to different cyber attacks. Companies and states must methodologically develop and implement a comprehensive strategy…

Read More

2014/12/23Edito – The Sony case [By General of the army (2S) Watin-Augouard]

The cybersecurity discussion consists of several key dates: 2007 (Estonia), 2008 (Georgia), 2009 (South Korea), 2010 (Natanz), 2011 (Elysee and Bercy), 2012 (Saudi Arabia), 2013 (Snowden case). Will 2014 end without giving us a reference? Helas, not! In the final stretch, it has been revealed the massive attack suffered by Sony, as the film The…

Read More

2014/11/21Dynamic Identity Verification and Authentication (DIVA) [by André Jacques Brisson, Whitenoise Laboratories Canada Inc.]

ABSTRACT Dynamic Identity Verification and Authentication (DIVA) secure communications for all networks through the cloud and create secure virtual networks within the cloud. DIVA is a secure protocol that prevents all cyber security and identity theft attacks by demanding proof of identity at the time of network access and throughout the network session. It assigns…

Read More