Skip to main content
  • When Journalist Under Cyber Attacks
    When Journalist Under Cyber Attacks

    In the Beginning

    One chilly evening a quick-breathing voice muttered over the phone saying his laptop computer was sabotaged. As the story unfolded, a journalist John who reported in-depth news about a political figure has been warned to keep quiet. John continued his job as usual. Somehow one evening when John was too tired and slammed his laptop to the sleep mode. So was he. Early next morning when he got up, to his surprise, he found the wallpaper of his computer was replaced by a bloody chopped head’s theme.

  • Asymmetric Threats in Cybersecurity
    Asymmetric Threats in Cybersecurity

    Asymmetric Threat

    The concept of “asymmetric threat” has its root from the military [1].  The asymmetric threat is defined as an attempt to circumvent or undermine an opponent’s strengths while exploiting the weakness, using methods that differ significantly from the opponent’s usual mode of operations.   

  • Cover
    The ABC's of Cybersecurity Models

    NIST Cybersecurity Framework

    The Framework [1] focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes.

    The Framework Core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover.  When considered together, these Functions provide a high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk.

  • Cover
    The Unsteady State of Cybersecurity

    The State of Cybersecurity

    In November and December 2015, ISACA and RSA Conference conducted a global survey of 461 cybersecurity managers and practitioners [1]. Survey participants confirmed that the number of breaches targeting organizational and individual data continues to go unchecked and the sophistication of attack methodologies is evolving. The current state of global cybersecurity remains chaotic, the attacks are not expected to slow down, and almost 75 percent of respondents expect to fall prey to a cyberattack in 2016.

  • Cover
    A Closer Look at Recent ATM Heist in Taiwan

    Ministry of Justice Investigation Bureau (MJIB) 法務部調查局 is the criminal-investigation and counter-intelligence agency reporting under the Ministry of Justice in Taiwan.  MJIB has recently announced the findings of ATM heist in Taiwan.

    findings of ATM heist in Taiwan.