Cybersecurity Insurance Not Paying for NotPetya Losses

This will complicate things: To complicate matters, having cyber insurance might not cover everyone’s losses. Zurich American Insurance Company refused to pay out a $100 million claim from Mondelez, saying that since the U.S. and other governments labeled the NotPetya attack as an action by the Russian military their claim was excluded under the "hostile or warlike action in time… Continue reading Cybersecurity Insurance Not Paying for NotPetya Losses

How cyberwarfare is playing into Yemen’s civil war

The bloody war in Yemen has been accompanied by a digital conflict in which combatants have used surveillance and cryptocurrency to their strategic advantage, new research shows. “[T]he dynamics of the Yemeni civil war are manifesting themselves online through a struggle over Yemeni access, use, and control of the internet,” Boston-based Recorded Future wrote in a blog post about the research on Wednesday. As the Yemeni conflict gains greater attention in Washington, the research highlights how cyber operations have become intrinsic to kinetic wars. In Yemen, the internet has become “another front” in a multi-faceted war, according to Recorded Future threat intelligence analyst Allan Liska told CyberScoop, The conflict, which has left tens of thousands people dead and created a widespread famine, has been fought by Houthi rebels, backed by Iran, and the Hadi government, supported by Saudi Arabia. U.S. intelligence, and weapons, have been used by the Saudi-led coalition. The new research […]

The post How cyberwarfare is playing into Yemen’s civil war appeared first on Cyberscoop.

Continue reading How cyberwarfare is playing into Yemen’s civil war

Gerhard Jacob’s ‘Taking Stock: The Internet of Things and Machine Learning Algorithms at War’

Image Credit , Israeli Defense Forces, The IDF Desert Rreconnaissance Battalion Training Exercises

Terrific blog post by Gerhard Jacobs, writing at the Imperva Cybersecurity blog, and discussing IoT and ML with Gilad Yehudai (Gilad is a Security Re… Continue reading Gerhard Jacob’s ‘Taking Stock: The Internet of Things and Machine Learning Algorithms at War’

D-Day, Operation Overlord, June 6, 1944

“… these men came here – British and our Allies, and Americans – to storm these beaches for one purpose only, not to gain anything for ourselves, not to fulfill any ambitions that America had for conquest, but just to preserve … Continue reading D-Day, Operation Overlord, June 6, 1944