Cyber Security of Weaponized Media in a Socially Engineered World

Corprorate Cyber Security., Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Gov 2.0, IoT Security, Online Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense, Weaponized Media
I.     Introduction The world is seeing an ongoing multi-faceted cyber attack(s) (social engineering) that uses weaponized fake media, digital false flags and other digitally obfuscated materials. These attacks stem from nation states, paid hacker cartels and mercenary hackers globally. These cyber security attacks utilize social engineering, weaponized media and fake media. We have been studying these socially engineered attacks since 2009, and have created unique responses to them. II.    Main body The Green Revolution of 2009 in Iran marked the first known use of weaponized social media. The Government of Iran utilized Twitter to get western citizens to spread their propaganda. Fast forward to 2016, where USA itself was attacked through long term, dedicated weaponized media cyber assault on our democracy; and government alike by Russia and its agents. This…
Read More
Digijaks CEO Speech at US Army CyberTalks NYC

Digijaks CEO Speech at US Army CyberTalks NYC

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Digital Diplomacy, Gov 2.0, IoT Security, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
https://www.youtube.com/watch?v=eX5Rgp2QmoU&feature=youtu.be  
Read More
#CyberSecurity #DigitalDiplomacy 2017

#CyberSecurity #DigitalDiplomacy 2017

Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Digital Diplomacy, Gov 2.0, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security
#Digitaldiplomacy and #Cybersecurity on a Rough Patch in 2017. The last several years have seen an explosion of digital diplomacy tools and techniques. This is driven by an ongoing growth in technology platforms; and social media combined with the increased numbers of world Governments adopting open data and open government principles. There has also been a parallel explosion in fake social media, fake news and fake information being propagated globally. The effect of the combined forces is that cybersecurity is now playing an even more vital role in digital diplomacy. Where digital diplomacy just a few years back was between recognized principals of Governments, now there are lots of other players trying to make that communication much more failure prone. Additionally we now have leaders using Twitter and other tools…
Read More

Emergency Social Media and You in Crisis

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cyber Warfare, Cybersecurity, Digijaks Reputation Control, Digital Defense, Gov 2.0, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Many people must feel the 2015 holiday break could not have arrived soon enough what with terrorism, crazy weather and other events that get covered rightly or wrongly in social media. While these can be scary and confusing times, they can also be times to educate, learn and help one another to understand a new reality we are all living in now. There are specific tactics and strategies for understanding how live events unfold in social media and these can be instructive to the general public about what you are seeing and when, during events like these past weeks that we have all experienced. Real life events almost always flow to the internet in a micro second. Knowing how to tell the difference between truth and fiction could be critical…
Read More
Cyber Reputation Management and Control

Cyber Reputation Management and Control

Anti-Corruption, Corprorate Cyber Security., Cyber Warfare, Developed by Digijaks, Digital Defense, Digital Diplomacy, Digital Shield, Gov 2.0, Personal Cyber security, Personal Cyber Security Mobile App, Platform/Service, Reputation Control, Reputation Management, Social Media Cyber Security, US National Cyber Defense
BAM!  There it is. Right in your face one morning when you check your social feed as news. That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand. Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up. Face it. The Internet is a hostile place for your reputation and your brand, whether that is personal, corporate or government. The control and management of your reputation start and end with you. As we enter 2015, it is worth paying attention to, in fact…
Read More

Cybersecurity: Now the Crossover from Cyber to Real Life

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Developed by Digijaks, Digital Defense, Digital Shield, Gov 2.0, Online Reputation Control, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering
[caption id="attachment_2095" align="aligncenter" width="300"] Cyber Security, Social Media, You.[/caption] Cybersecurity used to be be the geek's eagle's nest. it was hard to understand, hard to get to, hard to see the impact and need often times. If there was a CIO or CISO, he/she would not be in the board room too often, and usually the budgets were the first to go in any budget change environment. But the cycle switched. Now we are in the opposite cycle. The CIO and CISO are ruling the roost and commanding serious budgets and attention. But being missed in all the excitement is this: The Crossover from pure cyber crime to real world crime from the same instance. It is safe to say, times have changed. Now - Cybersecurity has become a word…
Read More

Reputation Control. Cybersecurity. Recent OPM Hacks and You.

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Digijaks Reputation Control, Digital Defense, Gov 2.0, Gov 3.0, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Management for Families, Reputation Security, Social Media Cyber Security, US National Cyber Defense
Reputation. Is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke. Cybersecurity is something many people long put off as a back burner decision, or lower funded priority, but in actuality is a critical need, now at the forefront of many leaders' thinking due to the sheer number and audacity of the hacks from 2013 forward. There is a distinct triangulation between reputation control and cyber security and search results. The more things get hacked, the more information flows onto websites, both for sale, and for free, and the more the search engines index these results. Digijaks’ CEO Alan W Silberberg has written about this triangulation before as it relates to cyber security and how we all need to…
Read More

GOV20LA 2014

Developed by Digijaks, Gov 2.0, Gov 3.0, Platform/Service
  Digijaks is the Proud Sponsor and Creator of Gov20la.   Gov 2.0 L.A. 2014 is 4/28/2014. Emergency First Responders Get Free Admission to Crisis Management Talks at GOV20LA 2014 Led by Experts   Back-to-back earthquakes in Los Angeles and an 8.2 deadly earthquake and tsunami hitting Chile Tuesday night has raised questions and concerns about how prepared emergency first responders, educators, city officials, and citizens are in a world where things can happen in an instant and technology plays front and center.   “This is both a wake up call and a warning. The wake up call is to remember how quickly our sense of normalcy can change to instant chaos. The warning is to be prepared and in an age where social media and real life are so…
Read More