Blog Posts Tagged with "Cyber Security"
December 16, 2011 Added by:Headlines
“Effective cyber defense requires us to continually test and improve our crisis management and decision-making procedures. This exercise was a great opportunity to promote the practical implementation of NATO’s new Cyber Defense Policy adopted last June..."
December 15, 2011 Added by:Kelly Colgan
Identifying threats is an offensive tactic. It’s a close monitoring of the system at hand and the cyber news media. It’s easier to be protective when you understand what kinds of hackers, criminal, or nation states are after your system’s data. Know how to handle toxic data...
December 14, 2011 Added by:Headlines
"This [activation] is a tribute to the belief in the notion that our nation requires assured freedom of maneuver in cyberspace in this era of persistent conflict and the advent of the increasingly more sophisticated threats to our security," said Maj. Gen. Mary A. Legere...
December 14, 2011 Added by:Scot Terban
Iranian Ambassador Mohammad Hassan Ghadiri discusses the potential for state sponsored attacks on the White House, FBI, CIA, and nuclear power plant systems within the US. The video shows the ambassador talking also asking about how to further the attacks by making certain contacts...
December 13, 2011 Added by:Headlines
The document is meant to provide a road map for cybersecurity efforts while observing the the need to preserve civil liberties, protect privacy, bolster national security, and provide the ability for the private sector to effectively operate and innovate in cyberspace...
December 13, 2011 Added by:Joel Harding
The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...
December 13, 2011 Added by:Don Eijndhoven
As for cyber warfare, there are various internationally accepted legal frameworks and that can provide some help. Consider the Law of Armed Conflict or Universal Human Rights, both of which have received wide adoption and have led to increased cooperation among nation states...
December 12, 2011 Added by:Headlines
"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...
December 08, 2011 Added by:Headlines
"Interfacing so many different hardware and software components introduces vulnerabilities—especially when new and legacy hardware and software need to operate together... Perfect protection from cyber attacks is not possible. There will be a successful attack at some point..."
December 07, 2011 Added by:Headlines
"Sustained efforts in these areas will result in a more secure and trustworthy cyberspace. We invite researchers and innovators in industry and academia to join us in this effort. Together, we can maximize the benefits of research and accelerate their transition into the marketplace..."
December 05, 2011 Added by:Headlines
"Establishing and using a unified framework for cybersecurity work and workers is not merely practical but vital to the nation's cybersecurity. Much as other professions have defined their specialties, it is now time to forge a common set of definitions for the cybersecurity workforce..."
December 04, 2011 Added by:Danny Lieberman
“Why does every hacking and cyberscam story – real or fictional – seem to have a Russia connection? In part, it is prejudice and laziness. The stereotype of the Russian hacker has become such a common media trope that it gets recycled again and again..."
December 02, 2011 Added by:Headlines
"In an era of limited financial resources, better coordinated efforts to address both cybersecurity-specific and broader federal workforce challenges are crucial to cost-effectively ensuring that the government has the people it needs to continue to deal with evolving cyber threats..."
November 30, 2011 Added by:Jeffrey Carr
CEOs refuse to act to protect their companies if it cuts into profit, the government has refused to protect our nation’s critical infrastructure because it's 90% privately owned, and our laws have enabled this massive malfeasance so that everyone responsible can claim absence of malice...
November 29, 2011 Added by:Headlines
"Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need cybersecurity tools and tactics to protect themselves, their customers, and their data from growing cyber threats..."
November 22, 2011 Added by:security curmudgeon
Most in the security industry frown upon botnet-for-hire operators that sell their stolen bandwidth for illicit purposes. Personally, while I don't like or agree with it, I understand it. They are no different than any other person selling questionable or illicit services or goods in our society...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013