Blog Posts Tagged with "Cyber Defense"


Dutch MoD Releases Defense Cyber Strategy

June 29, 2012 Added by:Don Eijndhoven

What makes this interesting is that they are declaring that non-combatants may also be actively targeted. In essence, they are putting the world on notice that if you’re involved with a cyber attack, part of a militia or a terrorist, you have a bull’s-eye on your head. No matter where you are. Plain and simple...

Comments  (0)


Striking Back in Cyberspace: Sanctioned or Vigilantism?

June 26, 2012 Added by:Joel Harding

You can strike back. Hiring your own security team you can discover who broke into your system. Establishing a honeypot, replicating your system and putting in ghost files will this tie up your infiltrators and significantly waste their time, and you can find out more about their techniques and track where they are...

Comments  (1)


Cyber War: The Strategic Importance of Defense

June 25, 2012 Added by:Plagiarist Paganini

The discovery of new cyber weapons will be published with increasing frequency, the real question to ask is if the world is really prepared to respond to these attacks. The stakes are high, security is critical for every nation, and the whole world must be analyzed as a monolithic system...

Comments  (0)


Cyber Warfare, Budget Cuts and a Shortage of Cyber Experts

June 16, 2012 Added by:Plagiarist Paganini

Despite the increased engagement in cyber warfare, the US must faces a crisis which has inevitable effects on the budgets allocated to defense. U.S. Defense Secretary Leon Panetta often has expressed concerns about the possibility of a major cyber attack against the US and its critical infrastructure...

Comments  (6)


Pentagon to Regionalize Cyber Response Capabilities

June 12, 2012 Added by:Headlines

“Although cyberspace presents some very unique characteristics, this transitional model is designed to continue DoD’s efforts at normalizing cyber as an integrated function with other land, maritime, air and space functions,” DoD spokesperson Lt. Col. April Cunningham said...

Comments  (0)


NATO and Cyber Defense

May 24, 2012 Added by:Headlines

In February 2012, a 58 million Euro contract was awarded to establish a NATO Cyber Incident Response Capability (NCIRC), to be fully operational by the end of 2012. A Cyber Threat Awareness Cell is also being set up to enhance intelligence sharing and situational awareness...

Comments  (0)


Is Security Broken? How I Propose to Fix It...

May 23, 2012 Added by:PCI Guru

In a true war, we would be investing in creating an offensive capability to go into cyber-battle with the enemy. And while there are discussions about having offensive capabilities, security professionals are still in a defensive posture protecting the organization...

Comments  (2)


NSA Announces New Program for Careers in Cyber Ops

May 23, 2012 Added by:Headlines

Many of the nation's colleges and universities offer courses or promote projects in cybersecurity. NSA's new program differs in that it integrates the relevant academic disciplines, with a focus on technology and the techniques associated with specialized cyber operations...

Comments  (0)


US vs. China: Is the Cyber Warfare Gap Increasing?

May 21, 2012 Added by:Plagiarist Paganini

"We continue to see China expressing interest in making investments to improve their capacity for operations in cyberspace, and that is something that we pay very, very careful attention to. There is the potential for these types of operations to be very disruptive..."

Comments  (0)


The US Cyber Guard Begins

May 17, 2012 Added by:Joel Harding

US cyber defenses will now include more than just the US Cyber Command and the Department of Homeland Security. Eventually it may include somewhere around 8,000 contractors, mostly defense contractors. Of course the conspiracy theorists will begin screaming “big brother”...

Comments  (0)


Dutch MoD Innovation Competition 2012: CYBER Operations 2.0

May 16, 2012 Added by:Matthijs R. Koot

The Dutch Ministry of Defense's (MoD) annually issues a "Defense Innovation Competition" is a competition that is intended to get input from and foster relations with Dutch industry and SME. This year's theme is "CYBER Operations 2.0"...

Comments  (0)


Researchers Developing Self-Defending Networks

May 15, 2012 Added by:Headlines

"This is a game-changing idea in cybersecurity.... we are currently losing against online attackers. In order to fundamentally change the cybersecurity landscape and reduce that high risk we need some big, fundamental changes to the way computers and networks are constructed..."

Comments  (0)


No National 'Stand Your Cyberground' Law Please

May 14, 2012 Added by:William Mcborrough

We know that some attacks on our privately owned critical infrastructure have been attributed to foreign government networks. Would it be wise to license companies to attack these networks? The last thing we need is an international incident started by some SysAdmin..

Comments  (0)


Pentagon CIO Discusses DoD's Cyber Defense Strategy

May 11, 2012 Added by:Headlines

"We deal with all aspects of cyber security. How to defend all our information. We have a lot of R&D to protect. There are those who want to get in and maliciously disable or damage or change information. We’re so heavily dependent on our network for a national security role..."

Comments  (0)


Cyber Warriors Shine in NSA Competition

May 01, 2012 Added by:Headlines

During the competition, NSA network specialists and military network experts formed the red cell team that challenged cadet blue cell teams to defend a closed-computer network that the cadets designed, built and configured at their respective academies...

Comments  (0)


National Collegiate Cyber Defense Competition (NCCDC)

May 01, 2012 Added by:Infosec Island Admin

"The Department of Homeland Security is proud to be one of the sponsors of this competition that took place over the course of three days and focused on the operational aspects of securing and defending a 'commercial' network infrastructure..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »