The Annual Technology Vectors brief has been published by the AFCEA International Technology Committee

  The Armed Forces Communications & Electronics Association (AFCEA) International Technology Committee has released an update of its annual presentation on current technology trends.

The briefing provides insights and expertise on emerging technology hot topics most relevant to Federal technology leaders and why these technologies require further scrutiny.

The technology vectors are featured in a concise knowledge base format and includes points of contact for questions and additional information.

Vector topics include elements and sub-elements surrounding cloud computing, smart/additive manufacturing, big data analytics, Apache Hadoop & Apache NiFi, advanced cybersecurity, quantum computing, and mobility/wireless communications.

The advanced cybersecurity areas include cyber supply chain anti-counterfeit measures, light-weight encryption for use in IoT devices, micro-segmentation protection capabilities in data centers, and artificial intelligence (AI) insertion for machine-to-machine security.

Requests for downloads of the presentation can be made at:

http://www.afcea.org/signal/resources/linkreq.cfm?id=114

Cybersecurity Strategy Needed for the Banking Industry

Even though cybersecurity has been recognized as a high priority among financial institutions, the results of a recent survey conducted at FICO’s Asia Pacific Chief Risk Officer (CRO) Forum revealed 64% of senior banking officials in the Asia Pacific region feel their institutions are not prepared for cyber threats.

Findings from the survey bear close correlation to trends identified in a 2014 PwC report that found cybercrime to be the second most prevalent economic crime within the financial sector.  This provides a clear indication within the banking industry – that can easily be extrapolated to other business sectors  – of the growing need for implementation of a cyber strategy framework to deal with computer network vulnerabilities, hacker threats, and attacks to customer data and critical information technology infrastructures.

Ideally, a comprehensive strategy should be scalability to the size of the organization, have defensive capabilities that mature over time, and incorporate three main elements – the means for assigning attack attribution, dynamic rules-of-action for impact mitigation, and established trust relationships for threat prevention and business recovery information sharing.

These concepts form the fundamentals of two in-depth methodologies I have developed entitled,  “Cyber Strategy Maturity Modeling” and “Cyber Strategic ART (Attribution, Rules, and Trust).”

International Law Enforcement Ops Shut Down Darkode Malware Marketplace

“Investigators shut down an online marketplace where cybercriminals bought and sold hacked databases, malicious software and other products that could cripple or steal information from computer systems, the Justice Department announced Wednesday.

More than 70 cybercriminals in the United States and 19 other countries are targets of the investigation, authorities said. Some of them have been charged, while others were the subject of search warrants because some countries require evidence to be seized before criminal charges can be filed, investigators said.

The site, called Darkode, was the largest-known English-language malware forum in the world, authorities said. Darkode is responsible for hundreds of millions in financial losses, the FBI said. The scale of the investigation, which involved 20 countries, was unprecedented…”

The full story is available at:

http://hosted.ap.org/dynamic/stories/U/US_CYBERCRIMINAL_MARKETPLACE_NYOL-?SITE=NYSCH&SECTION=HOME&TEMPLATE=DEFAULT

FBI Offers $4.3 Million Reward for Cybercrime’s Most-Wanted!

Have you seen any of these men?  One of the first indications of bounty on the heads of cyber’s most-wanted group of individuals.  This really raises the awareness bar on activities in the cybercrime world; especially when law enforcement begins to put a face with a name.  See the photographs, charges, aliases, and the like of the most=wanted on the main FBI website.

https://www.fbi.gov/wanted/cyber/@@wanted-group-scroll-view

Read the detailed story on the Dark Reading site:

“Big prize still going to whomever can help find Gameover ZeuS mastermind.  The FBI’s updated Cyber Most Wanted List now includes 15 men (no women). The Bureau is still not offering monetary rewards for information leading to the arrests of five members of the People’s Republic of China’s People’s Liberation Army who remain on the list. However, they are offering bounties for most others, which add up to over $4.3 million…”

http://www.darkreading.com/vulnerabilities—threats/fbi-offering-$43-million-for-help-finding-cyber-most-wanted/d/d-id/1321181