Blog Posts Tagged with "National Security"

69dafe8b58066478aea48f3d0f384820

WikiLeaks Source Manning Used Data-Mining Software

April 05, 2011 Added by:Headlines

The U.S. Army has confirmed that accused WikiLeaks source Bradley Manning had installed data-mining software on his SIPRnet-linked computer during the same period he is suspected of harvesting hundreds-of-thousands of classified government documents...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

State Actors Develop Cyberweapons to Cripple Infrastructure

March 25, 2011 Added by:Dan Dieterle

“We believe that state actors have developed cyberweapons to cripple infrastructure targets in ways tantamount to kinetic assaults. Some of these weapons could potentially destroy hardware as well as data and software..."

Comments  (9)

B64e021126c832bb29ec9fa988155eaf

Social Media and Lone Wolf Terror Attacks

March 17, 2011 Added by:Dan Dieterle

Social media sites that is allowing terror groups to communicate, especially to singular operatives, according to The National’s coverage of a Saudi counter-terrorism conference. Of major concern was how to combat the use of social media sites to recruit and communicate with lone wolf terrorists...

Comments  (2)

959779642e6e758563e80b5d83150a9f

What if al-Qaeda Got Stuxnet?

March 02, 2011 Added by:Danny Lieberman

Given these circumstances, deterrence will necessarily be based more on denying any benefit to attackers than on imposing costs through retaliation. To stay ahead of its pursuers, the United States must constantly adjust and improve its defenses...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cyberterrorism - As Seen On TV

March 01, 2011 Added by:J. Oquendo

The fact is, cyberterrorism is such an overrated term with no definitive rhyme or reason and it seems that anyone who uses antivirus software nowadays can call themselves a security expert, spread a rumor, embed the term terrorism and cause more damage than some lowly terrorists...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Government to Design Cyber Defense Doctrine

February 27, 2011 Added by:Don Eijndhoven

Maj. General Koen Gijsbers spoke at the InfoSecurity convention in Utrecht in November, and his take on Cyber Warfare confirms a lot of what I previously posted. Regardless of budget cuts, the Dutch Department of Defense still wants to invest in the development of cyber warfare capabilities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senator Proposes New Cybersecurity Legislation

February 10, 2011 Added by:Headlines

"Cyber-threats are not on the horizon, they are upon us. Businesses and investors must trust that their investments are secure. We cannot allow security breaches to undermine our trust in the U.S. economy," said Senator Menendez...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force General Urges Enhanced Cyber Deterrence

January 27, 2011 Added by:Headlines

“If we elect to use cybercapability to deter — and you don’t necessarily have to, you can use something else to deter bad cyberbehavior — [but] if we’re going to use cybercapabilities to deter, that’s going to beg for some demonstration of that capability..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House Scores Low on Cybersecurity Report Card

January 25, 2011 Added by:Headlines

The National Security Cyberspace Institute has released a report that examines the White House record on cybersecurity policy over the last two years. The grades earned are mediocre at best, and do not live up to the challenges facing cybersecurity in the wake of Aurora, Stuxnet, and WikiLeaks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressman Wants WikiLeaks on Treasury Blacklist

January 14, 2011 Added by:Headlines

Blacklisting by the Treasury Department is equivalent to marking an individual or group on par with terrorist organizations, and would bar U.S. citizens and companies from doing business or providing any material support whatsoever for the rogue whistleblower organization...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

USB Device Containing Military Secrets Missing

January 05, 2011 Added by:Headlines

A removable USB storage device, alleged to contain classified level-two U.S. military secrets, is missing in South Korea. The unit was first reported missing in July, but the Army officer responsible for the hardware falsely reported that he had located and then discarded the device...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Asserts Agency's Leading Role in Cyber Security

December 21, 2010 Added by:Headlines

Cyberspace is fundamentally a civilian space. There are some who say cybersecurity should be left to the market, and there are some who characterize the Internet as a battlefield. Both the market and the battlefield analogies are the wrong ones to use...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Marine One Breach Has Winners and Losers

March 01, 2009 Added by:Anthony M. Freed

Billions of dollars are spent on security every year, and it can be trumped by one lapse in judgment. That is a tremendous amount of resources committed to security just to have it undermined by the whim of one individual, and it underscores the precariousness of secure systems...

Comments  (2)

Page « < 14 - 15 - 16 - 17 - 18 > »