Governance & Risk Management , Incident & Breach Response , Insider Threat

What's Behind WikiLeaks' Release of CIA Hacking Files

Also, Tackling the Rise of Attacks Targeting Internet of Things
What's Behind WikiLeaks' Release of CIA Hacking Files

Leading the latest edition of the ISMG Security: A deep dive into the WikiLeaks release of thousands of documents that appear to lay open in detail the CIA's computer hacking techniques Report.

In the Security Report, you'll hear (click on player beneath image):

The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our March 3 and March 7 reports that respectively analyze legislation before Congress that would strengthen the influence of the National Institute of Standards and Technology on federal civilian agencies and the return of the Crypt0L0cker ransomware.

The next ISMG Security Report will be posted on Tuesday, March 14.

Theme music for the ISMG Security Report is by Ithaca Audio under the Creative Commons license.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.