Blog Posts Tagged with "National Security"

69dafe8b58066478aea48f3d0f384820

MI5 Chief: Cyber Espionage Threat on an "Industrial Scale"

June 26, 2012 Added by:Headlines

"Britain’s National Security Strategy makes it clear that cyber security ranks alongside terrorism as one of the four key security challenges facing the UK. Vulnerabilities in the internet are being exploited aggressively not just by criminals but also by states. And the extent of what is going on is astonishing..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report Examines Increasing Threats to Critical Infrastructure

June 21, 2012 Added by:Headlines

“Outdated security methods that use a maze of disparate, multi-vendor, and stacked security tools will only delay a cyber attack, providing numerous opportunities for a more advanced and modern cyber adversary to attack cyber security postures throughout critical infrastructure...”

Comments  (0)

296634767383f056e82787fcb3b94864

Breach Alert: Putin Makes Drone Development a National Priority

June 19, 2012 Added by:Jeffrey Carr

Russia plans to spend US$13B on UAS development over the next eight years. Part of that technology development strategy is almost certainly going to be acquiring intellectual property on related technology from foreign firms. Two good examples of companies at risk are Boeing and General Atomics...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Huawei Boasts of Remote Data Interception Capabilities

June 19, 2012 Added by:Headlines

“Embedding these capabilities in any network means…(that) they can then intercept and control those networks... I am so worried about Chinese cyber warfare threats, their abilities to monitor and remotely shut down international communications networks, including critical infrastructure networks"...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

FBI Announces Executive Appointments in Cyber Division

June 19, 2012 Added by:Headlines

FBI Director Robert S. Mueller announced that Joseph M. Demarest will move to the Cyber Division as assistant director and that Cyber Division Section Chief James C. Burrell has been appointed deputy assistant director of the Cyber Division at FBI Headquarters...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bulletin of the Atomic Scientists Warns of Cyber Arms Race

June 18, 2012 Added by:Headlines

"With confirmation that the United States was behind the 2010 cyberattack on Iran's nuclear enrichment facility, the world has officially entered a new era of warfare... The parallels with the invention and first use of atomic bombs on Hiroshima and Nagasaki are eerie," writes Benedict...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Will the Next Stuxnet be a Russian - Iranian Creation?

June 18, 2012 Added by:Dan Dieterle

Russia has very advanced cyber capabilities, and they have shared military hardware and tech with middle east nations before. It is not a big leap to think that they could and would share cyber warfare technology with these nations, especially if they rely on these nations for energy reserve...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyber Warfare, Budget Cuts and a Shortage of Cyber Experts

June 16, 2012 Added by:Pierluigi Paganini

Despite the increased engagement in cyber warfare, the US must faces a crisis which has inevitable effects on the budgets allocated to defense. U.S. Defense Secretary Leon Panetta often has expressed concerns about the possibility of a major cyber attack against the US and its critical infrastructure...

Comments  (6)

69dafe8b58066478aea48f3d0f384820

NSA's National Centers of Academic Excellence Announced

June 15, 2012 Added by:Headlines

Program graduates often develop into cyber experts who help to protect national-security information systems, commercial networks, and critical information infrastructure in both the private and public sectors – meeting the increasingly urgent needs of the U.S. government, industry, and academia...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Panetta: Urgency Needed to Defend Against Cyber Attacks

June 15, 2012 Added by:Headlines

“I'm very concerned at the potential in cyber to be able to cripple our power grid, to be able to cripple our government systems, to be able to cripple our financial systems. It would virtually paralyze this country. And as far as I'm concerned, that represents the potential for another Pearl Harbor… using cyber"...

Comments  (4)

5106d48203954b74e6ea495e5c7f21b0

The Need for Improved Critical Infrastructure Protection

June 13, 2012 Added by:William Mcborrough

Tackling the problem of critical infrastructure protection will take concerted efforts from the public and private sectors. An appropriate governance structure is needed to avoid the inevitable over-reaction that will follow the inevitable catastrophic attack against our critical infrastructure...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Judge Upholds Charges Against WikiLeaker Bradley Manning

June 12, 2012 Added by:Headlines

Manning is accused of the largest intelligence leak in U.S. history while deployed to Iraq as a military intelligence analyst, including installing unauthorized software onto government computers to extract classified information and transmitting the data to the whistle-blowing group WikiLeaks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attorney General Taps Federal Prosecutors for Stuxnet Leak

June 11, 2012 Added by:Headlines

With the appointment of special investigators by Holder, the probe has widened to include the disclosure of the development of the Stuxnet virus, which infected systems that provided operations control for Iranian production networks, and was most likely produced to stifle Iran's nuclear weapons program...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cybersecurity: Washington DC is a World of Grey

June 07, 2012 Added by:Joel Harding

The US State Department cannot sign many treaties in cyberspace, and we cannot establish a lot of cooperation, because there is a lack of a definition or there is no established threshold for most of what we deal with. Part of that problem is that as soon as the ink dries, most of the conditions will change...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Hosts White House Cyber Jobs Event

June 06, 2012 Added by:Marjorie Morgan

"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Opens Investigation into Stuxnet Attack Leaks

June 06, 2012 Added by:Headlines

The FBI is probing the source of recently leaked information regarding covert cyber operations conducted by the U.S. government, particularly the Stuxnet attacks. Stuxnet is largely considered to be a game changer because the virus affected kinetic damage on equipment the targeted systems controlled...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »