Today, cyber means war. But back in the 1990s, it meant sex — at least, the kind of sex you can have in a chat room. Why did the word change, and where did it originally come from?
It all started with “cybernetics,” an obscure term popularized by a mathematician named Norbert Weiner in the 1940s. For his groundbreaking book Cybernetics, Weiner borrowed the ancient Greek word “cyber,” which is related to the idea of government or governing. Indeed, the only time the word cybernetics had appeared before was in a few works of political theory about the science of governance.
In his writing, Weiner described what was at the time a pretty futuristic idea — that one day there would be a computer system that ran on feedback. Essentially, it would be a self-governing system. And for a long time, cybernetics remained the purview of information theorists like Weiner, and early computer programmers.
Vormetric announced the results of its “Insider Threat” survey, which surveyed more than 700 IT decision-makers.
The study of mid-market and enterprise organizations indicates that 54 percent believe it is more difficult to detect and prevent insider attacks today than it was in 2011. Additionally, 46 percent say they are vulnerable to an insider threat attack – in spite of their existing security skills, resources, processes, and technologies.
Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their knowledge of the evolving vulnerability and attack landscape, such as mobile and social technologies, to more effectively combat emerging security threats.
For CISOs, it’s no surprise that tried and true attack tactics can cause the most damage to an enterprise. Known vulnerabilities left unpatched in Web applications and server and endpoint software, create opportunities for attacks to occur. These unpatched applications and software continue to be facilitators of breaches year after year. However, the latest X-Force report also recognizes that attackers are improving their skills, which allows them to increase their return on exploitation. These attackers are capitalizing on users’ trust when it comes to new vectors like social media, mobile technology and waterhole attacks.
Recent revelations of the National Security Agency’s vast spying program has made users feel less secure, new data finds.
Some 65 percent of consumers, SMBs, large enterprises, and government agencies in the survey say they feel less safe now knowing that the NSA has access to electronic and phone records, while 26 percent are ambivalent, 4.5 percent feel safer, and 4 percent aren’t aware of the NSA program.
via Post-NSA Revelations, Most Users Feel Less Safe — Dark Reading.
I wonder how much of this is due to media fatigue.