Observers discern weaknesses in the Caliphate's social media presence, and suggest ways of countering it. Of particular note are their characterization of ISIS's online sympathizers as clustering "D-listers" and their advice to treat such sympathizers as a dense network. They also advise that governments outsource social media information operations (which tend to require close attention and a high rate of engagement) to credible third parties.
The Premera data breach post mortems continue as expected. Insurers and healthcare providers are increasingly attractive hacking targets for familiar Willie-Suttonesque reasons: that's where the data (and therefore the money) are.
Security professionals await the expected OpenSSL patch with interest and trepidation.
Snowden-approved OS Tails appears more vulnerable to attack than generally assumed.
Experts offer an antidote to much fear about IoT hacking — without minimizing the real risks, there's more heat than light in evidence concerning remote carjacking, rogue refrigerators, etc.
In industry news, KPMG Australia boosts its cyber security business by acquiring First Point Global. KEYW picks up two smaller firms: Ponte Technologies, LLC and Milestone Intelligence Group.
Enterprise security managers discuss the importance of knowing one's own network, and the benefits of well-crafted policies. Dark Matters grumps about threat intelligence, and their bloggers have a point: general warnings make enterprises uneasy without giving them anything they can act on.
The Chinese government lifts the curtain (a bit) offering an acknowledgement of its offensive cyber capabilities. There's some talk in the US Defense Department of creating a fifth military service dedicated to cyber operations.