Arquilla, J. (2011, October). From blitzkrieg to bitskrieg: The military encounter with computers. Communications of the ACM, 54(10), 58-65. doi:10.1145/2001269.2001287 [Full text available in ACM Digital Library database.]
The age of computers in battle that has unfolded over the past 70 years hasproved similar to earlier eras in military history, with these new informational
tools pointing to new practices. Today, computers serve not only to guide weapons and break codes but also to winnow vast amounts of battle-related information in the search for insight while facilitating lateral communications, or contact with fellow field units, not just with distant commanders. It is this super-empowerment of those who actually conduct the fighting that most distinguishes our era of informational advances from earlier ones.
Montalbano, E. (2011, October 14). SEC mandates cyber incident reporting. Information Week. Retrieved from http://www.informationweek.com/news/government/policy/231900861 [disclosure guidance from SEC].
The Securities and Exchange
Commission has issued its first official guidance for how
companies should report cybersecurity incidents that could have a
negative impact on operations or their financial status. ... The SEC long has required companies to report any
incidents that could impact their financial performance, but to date
has not outlined requirements for disclosing cybersecurity or other
cyber incidents in particular.
Osawa, J. (2011, October 13). PlayStation takes new hit - Sony suspends 93,000 user accounts after suspicious activity on network. Wall Street Journal, p. B9. Retrieved from http://www.wallstreetjournal.com [Full text available in Wall Street Journal database.]
Setting back its efforts to repair its reputation regarding online security, Sony Corp.
said it was forced to suspend about 93,000 user accounts after
discovering a "large" number of unauthorized sign-in attempts on its
PlayStation Network and other online entertainment services.