->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

The battle against cyberterror

ATCA Circular

London, UK - 29 November 2004, 18:30 GMT - Please note the following well researched and balanced article on Cyber Terrorism by John Blau:

The battle against cyberterror

The following mi2g Intelligence Unit material is useful background:

How real is the threat of cyber terrorism?

and also:

Q3 2004: The rise of Islamist hacking and criminal syndicates

Any comments, observations or views are welcome.

[ENDS]


mi2g
is at the leading edge of building secure on-line banking, broking and trading architectures. The principal applications of our technology are:

1. D2-Banking;
2. Digital Risk Management; and
3. Bespoke Security Architecture.

mi2g pioneers enterprise-wide security practices and technology to save time and cut cost. We enhance comparative advantage within financial services and government agencies. Our real time intelligence is deployed worldwide for contingency capability, executive decision making and strategic threat assessment.

mi2g Research Methodology: The Frequently Asked Questions (FAQ) List is available from here in pdf. Please note terms and conditions of use listed on www.mi2g.net

Full details of the October 2004 report are available as of 1st November 2004 and can be ordered from here. (To view contents sample please click here).

Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy