Quantcast
Channel: Argent Consulting - Full Spectrum Cyber » Argent Consulting - Full Spectrum Cyber | » Cyber Warfare
Browsing all 12 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Social Media as a Cyber Warfare Gamechanger

September of 2012 will live on in infamy for a large number of people. It was the month of the massive riots by Islamic extremists who, incited by the ever present radical imams, stormed several US...

View Article



Image may be NSFW.
Clik here to view.

The Case for National Cyber Labs

Recently I received a most interesting link from a friend, about a tiny city that was actually a perfect working model of a real-life city built by the SANS Institute. It had real banking networks,...

View Article

Image may be NSFW.
Clik here to view.

On Iran and Pre-Emptive Cyber Attacks

Early in February of 2013, many news outlets came out with articles about the US Government having a ‘secret legal review‘ on the use of its cyber-arsenal. This legal review concluded that the US...

View Article

Image may be NSFW.
Clik here to view.

The Chilling State of Cyber Affairs

With all the attention pointed towards PRISM, another interesting publication was virtually overlooked. Earlier last month, a taskforce belonging to the US DoD’s Defense Science Board (DSB) released a...

View Article

Image may be NSFW.
Clik here to view.

PRISM: Tip of the Cyber Intel Iceberg

When Edward Snowden published information on PRISM – a rather drastic intelligence gathering program in which several (assume All) government agencies such as the FBI and the NSA draw intelligence from...

View Article


Argent Consulting buys B-Able Argent Consulting

PRESS STATEMENT Monday, 26th May 2014. The Netherlands: Due to insurmountable differences among management, the joint effort between Argent Consulting and B-Able, dubbed “B-Able Argent Consulting” has...

View Article

Image may be NSFW.
Clik here to view.

Information Security, Post-Snowden

As published on Tripwire’s State of Security: The revelations regarding the extensive digital intelligence gathering programs of the American National Security Agency by Edward Snowden won’t have...

View Article

Image may be NSFW.
Clik here to view.

Using the Cyber Kill Chain to Map Cyber Defenses with Practical Reality

In an effort to better understand the structure and approach of “APT Attacks”, which was at the time virtually a euphemism for cyber-attacks coming from China, researchers investigated hundreds of...

View Article


Image may be NSFW.
Clik here to view.

GCCS 2015: Battlefield for the Internet’s Multi-Stakeholder Coup (Part I)

Published on Norse Corp on Jan 21st, 2015 As you may already be aware, the next iteration of the Global Conference on CyberSpace will be held on April 16th and 17th in The Hague, the Netherlands this...

View Article


Image may be NSFW.
Clik here to view.

Enterprise Security vs. Nation State Threat Actors

The recently published Snowden/NSA/GCHQ slides regarding the Gemalto hack have caused quite a stir amongst security practitioners, board members and politicians alike. But the uproar is minor when...

View Article

Image may be NSFW.
Clik here to view.

The Right to Strike Back

As published on Norse on June 26, 2015. Last week, at the HiP Conference in Paris, there was a debate on whether or not it should be allowed to strike back when you are being hacked. Currently,...

View Article

Image may be NSFW.
Clik here to view.

Cyber Cease-Fire: US v. China

As published on Norse on October 6th, 2015 Interesting times indeed, now that the outcome of Chinese president Xi Jinping’s two-day visit to the White House last week has been made public. According...

View Article
Browsing all 12 articles
Browse latest View live


Latest Images