Cyber Security of Weaponized Media in a Socially Engineered World

Corprorate Cyber Security., Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Gov 2.0, IoT Security, Online Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense, Weaponized Media
I.     Introduction The world is seeing an ongoing multi-faceted cyber attack(s) (social engineering) that uses weaponized fake media, digital false flags and other digitally obfuscated materials. These attacks stem from nation states, paid hacker cartels and mercenary hackers globally. These cyber security attacks utilize social engineering, weaponized media and fake media. We have been studying these socially engineered attacks since 2009, and have created unique responses to them. II.    Main body The Green Revolution of 2009 in Iran marked the first known use of weaponized social media. The Government of Iran utilized Twitter to get western citizens to spread their propaganda. Fast forward to 2016, where USA itself was attacked through long term, dedicated weaponized media cyber assault on our democracy; and government alike by Russia and its agents. This…
Read More
Modern Information Warfare Hits Hard

Modern Information Warfare Hits Hard

Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
2016 was just the latest in #cyberwar; and #informationwarfare attacks where even bills were introduced in Congress. It has been ongoing as long as there have been digital mediums and technologies; and information distribution technology. My company saw it happening last year and got more and more concerned as the election grew closer. We literally wrote letters to people in government, people at the DNC and elsewhere, basically yelling as loudly as we could that the #USA was being cyber and information warfare attacked.   As a cyber security, and weaponized information expert - it was all too clear what was happening. It has left a feeling of being sick in the stomach for a year now, and this feeling has not abated. Because it has not ended. For millions of Americans and millions of…
Read More
Digijaks CEO Speech at US Army CyberTalks NYC

Digijaks CEO Speech at US Army CyberTalks NYC

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Digital Diplomacy, Gov 2.0, IoT Security, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
https://www.youtube.com/watch?v=eX5Rgp2QmoU&feature=youtu.be  
Read More

Global Cyber Security On Earth + in Space

Corprorate Cyber Security., Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Digital Shield, IoT Security, Online Reputation Security, Personal Cyber security, Platform/Service, Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense, Venture Capital Cyber Security
**Excerpt from a talk by Digijaks CEO Alan W. Silberberg at the 2016 GEOINT Symposium.** When you think of Cyber Security you probably think about your iphone getting hacked, or your email, or your companies servers, or your credit card, or bank card or health care, or banking, or government information plus so many others... But did you ever stop to think about how a huge chunk of all the data populating all those things actually gets there? Not in the sense of how Google asks prospective employees to describe how the internet works. But close. Think Space. Satellites are massive growth industry, for both government and business alike. We have scaled globally from a situation 20 years ago where only a handful of countries could afford to mount in…
Read More
Cybersecurity Dilemna -A Conundrum-

Cybersecurity Dilemna -A Conundrum-

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security Venture Capital, Cyber Warfare, Cybersecurity, Digital Defense, Online Reputation Control, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Venture Capital Cyber Security
  co·nun·drum kəˈnəndrəm/ noun noun: conundrum; plural noun: conundrums a confusing and difficult problem or question. "one of the most difficult conundrums for the experts" This is the conundrum of the digital age. One one hand executives of a company will be the first to state they think their systems are secure, and if there are any problems they are small. or Maybe they think their information, data and business relationships are not important to hackers because, "too small", "not on radar screen", or "we have nothing worth taking." But both of these are clearly conundrums: The first is pretty basic, if you think you are secure but have not brought in outsiders to test your systems and people and facilities, then how do you know? The second is also…
Read More

Emergency Social Media and You in Crisis

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cyber Warfare, Cybersecurity, Digijaks Reputation Control, Digital Defense, Gov 2.0, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Many people must feel the 2015 holiday break could not have arrived soon enough what with terrorism, crazy weather and other events that get covered rightly or wrongly in social media. While these can be scary and confusing times, they can also be times to educate, learn and help one another to understand a new reality we are all living in now. There are specific tactics and strategies for understanding how live events unfold in social media and these can be instructive to the general public about what you are seeing and when, during events like these past weeks that we have all experienced. Real life events almost always flow to the internet in a micro second. Knowing how to tell the difference between truth and fiction could be critical…
Read More
Cyber Reputation Management and Control

Cyber Reputation Management and Control

Anti-Corruption, Corprorate Cyber Security., Cyber Warfare, Developed by Digijaks, Digital Defense, Digital Diplomacy, Digital Shield, Gov 2.0, Personal Cyber security, Personal Cyber Security Mobile App, Platform/Service, Reputation Control, Reputation Management, Social Media Cyber Security, US National Cyber Defense
BAM!  There it is. Right in your face one morning when you check your social feed as news. That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand. Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up. Face it. The Internet is a hostile place for your reputation and your brand, whether that is personal, corporate or government. The control and management of your reputation start and end with you. As we enter 2015, it is worth paying attention to, in fact…
Read More

#IoT Security Is Just Not.

Cyber Reputation Control, Cybersecurity, Digital Defense, IoT Security, Online Reputation Security, Reputation Control, Reputation Security
A few weeks ago I wrote this piece about #IOT Cybersecurity and how it affects personal and brand reputations. I got a lot of criticism for basically speaking the truth. I appreciate all the tweets, emails and Linkedin posts engaging on this piece, including all the people who attempted to say I was wrong. But the points raised in that piece are simply the opening salvo in a multi front disruption. The disruption is NOT IoT. The disruption is to switch from product leading first with security as an afterthought in the rush to go to market. What needs to change is the mindset to build in design security from the beginning, Last week I sat on a panel at the California Cyber Security Task Force meeting. The panelists were…
Read More
Reputation Control for Kids by Social Media, Search Results

Reputation Control for Kids by Social Media, Search Results

Cyber Reputation Control, Cyber Reputation Management, Digijaks Reputation Control, Digital Defense, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Management, Reputation Management for Families, Reputation Security
In Digijaks daily course of business with reputation management we come across a lot of people (adults) who have seen their life get turned upside down because of something appearing in search results that negatively affect them. This happens so much, and so often it has created a whole industry to deal with it. Search results leading to problems to people happen for many reasons. I recently wrote about this problem on the Huffington Post as it relates to adults. But this same correlation exists for kids, for families and the same problems may arise, but with lifelong implications. Imagine being an 11 year old who innocently posts a picture or a quote or a poem or a location, thinking nothing of it. Fast forward 6 years to college applications.…
Read More

Cybersecurity: Now the Crossover from Cyber to Real Life

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Developed by Digijaks, Digital Defense, Digital Shield, Gov 2.0, Online Reputation Control, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering
[caption id="attachment_2095" align="aligncenter" width="300"] Cyber Security, Social Media, You.[/caption] Cybersecurity used to be be the geek's eagle's nest. it was hard to understand, hard to get to, hard to see the impact and need often times. If there was a CIO or CISO, he/she would not be in the board room too often, and usually the budgets were the first to go in any budget change environment. But the cycle switched. Now we are in the opposite cycle. The CIO and CISO are ruling the roost and commanding serious budgets and attention. But being missed in all the excitement is this: The Crossover from pure cyber crime to real world crime from the same instance. It is safe to say, times have changed. Now - Cybersecurity has become a word…
Read More