Blog Posts Tagged with "Military"

7fef78c47060974e0b8392e305f0daf0

Defense Industrial Base Cyber Security Program

May 14, 2012 Added by:Infosec Island Admin

The United States continues to face a significant risk that critical Defense information networks can be compromised by malicious actors resulting in economic losses or damage to national security. The DIB CS/IA Program is designed to improve DIB network defenses...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon CIO Discusses DoD's Cyber Defense Strategy

May 11, 2012 Added by:Headlines

"We deal with all aspects of cyber security. How to defend all our information. We have a lot of R&D to protect. There are those who want to get in and maliciously disable or damage or change information. We’re so heavily dependent on our network for a national security role..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Panetta Treads Lightly Around Chinese Cyber Attacks

May 10, 2012 Added by:Headlines

"I can hardly agree with the proposition that the cyber attacks directed to the United States are directly coming from China. And during the meeting, Secretary Panetta also agreed on my point that we cannot attribute all the cyber attacks in the United States to China..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

China vs. Philippines: Cyberwar or Hacktivism?

May 03, 2012 Added by:Pierluigi Paganini

While attention is focused on Iran and its quarrel with the West, other silent battles are being fought. In the last month, there has been a surprising level of activity between China and the Philippines, with reciprocal attacks via bits and bytes. Are we witnessing a cyber conflict?

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Did Iran Recover Encrypted Data from Downed Stealth Drone?

May 02, 2012 Added by:Dan Dieterle

Iranian officials recently released claims that they have finished their reverse engineering of the downed US stealth drone and will begin to make a copy. The Iranians released information they say was encrypted flight and maintenance data from internal databases...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Military Advocates Cyber Offensive Capability

May 02, 2012 Added by:Headlines

“If this represents the official line of thinking, this means that the prospects are not good that a limited conflict in a Taiwan Straits would remain localized to that geography without escalating into an all-out war,” said Chinese cyber warfare expert Dmitri Alperovitch...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Warriors Shine in NSA Competition

May 01, 2012 Added by:Headlines

During the competition, NSA network specialists and military network experts formed the red cell team that challenged cadet blue cell teams to defend a closed-computer network that the cadets designed, built and configured at their respective academies...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iran vs. The West: Cyberwar or Media Hype?

April 27, 2012 Added by:Pierluigi Paganini

The growing tension between Iran, the U.S. and Israel does not bode well, however the reports persistently circulated on the Internet don't add anything new to a scenario that has long been known. Iran has long understood how strategic a strong presence in cyber space is...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

House Testimony: Iran Preparing Attacks on U.S. Infrastructure

April 26, 2012 Added by:Headlines

Cybersecurity experts will testify before Congress today on the high probability that the Iranian government is engaged in building a cyber offensive force geared towards attacks against critical U.S. infrastructure targets including power and water distribution facilities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Wins NSA's 12th Annual Test of Cyber Defense

April 25, 2012 Added by:Headlines

The cybersecurity skills and ingenuity of students from the U.S. service academies, the Air Force Institute of Technology, and the Royal Military College of Canada were put to the test by the National Security Agency's top information assurance professionals...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Military Evaluates SIPRNet Smart Card to Protect Networks

April 24, 2012 Added by:Headlines

"As we learned through the events of Wiki Leaks, we had a blind spot in protecting our classified networks... We have a national strategy and program to implement a Public Key Infrastructure hardware based authentication system on the classified network - hence the SIPRNet token..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Air Force Vice Commander: Everyone is Focused on Cyber

April 20, 2012 Added by:Headlines

"The enemy will be inside our networks for malice, curiosity, or just for the challenge. We must prioritize our defense efforts with a mission assurance approach... Cyberspace is a part of every war fight, every mission that we're in. Everyone is focused on cyber...."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Commander Discusses Cyber Operations

April 19, 2012 Added by:Headlines

"My mission focus, [is] just like in any other domain - whether it is ground, sea, air or space - the same is true for cyber: we are responding to orders and guidance that support this nation in its responsibilities and national security efforts around the globe..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Officials Examine the Militarization of Cyberspace

April 16, 2012 Added by:Headlines

"If there is significant information of a cyber-event, we reserve the right to use tools in our toolbox,. When does a cyber-attack achieve critical level? When one can attribute an attack that deliberately causes loss of life," a U.S. official stated...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD to Expand International Cybersecurity Cooperation

April 16, 2012 Added by:Headlines

“I think it’s very important to do as much as we can to prevent and mitigate the threat at home, but we can only get so far acting unilaterally. We have to act in concert… with countries around the world to address this problem...”

Comments  (1)

91648658a3e987ddb81913b06dbdc57a

Projectile Dysfunction

April 13, 2012 Added by:Ron Baklarz

Was it me or when they showed the North Korean Space Control Center did it not look like a group of students at a code fest? Seriously, there were no large screens for tracking and I’ve seen more computing power at the local senior citizens home...

Comments  (2)

Page « < 2 - 3 - 4 - 5 - 6 > »