Blog Posts Tagged with "National Security"

69dafe8b58066478aea48f3d0f384820

Pentagon CIO Discusses DoD's Cyber Defense Strategy

May 11, 2012 Added by:Headlines

"We deal with all aspects of cyber security. How to defend all our information. We have a lot of R&D to protect. There are those who want to get in and maliciously disable or damage or change information. We’re so heavily dependent on our network for a national security role..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Drones, Secret Surveillance, and Classifying the Wizard of Oz

May 10, 2012 Added by:Electronic Frontier Foundation

The FAA finally released the names of the government agencies which applied for and received authorization to fly drones in the US. Unfortunately, the list did not include what drones were authorized, what they were being used for, or what information they were collecting...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AQ, AQAP, BVD Bombs, CIA, INSPIRE, Media, Moles... Oh My

May 09, 2012 Added by:Infosec Island Admin

Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Legislation Would Stick Business with Cyberwar Costs

May 08, 2012 Added by:Headlines

"The legally mandated role of the government is to provide for the common defense, and they're willing to spend pretty much whatever it takes... If you're in a private organization, your legally mandated responsibility is to maximize shareholder value. You can't spend just anything..."

Comments  (2)

4289a029dd052b867dafc6cdf5bde53b

CISPA: The Devil is in the Details

May 07, 2012 Added by:Michelle Valdez

The problem with CISPA involves all the information added under one of the approved amendments. The vagueness about what information can be shared has caused most of the concern – especially that catch all category of “to protect the national security of the United States”...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

US Cybersecurity Capability: National Preparedness Report

May 07, 2012 Added by:Pierluigi Paganini

Cybersecurity is identified as a priority issue to enhance the efficiency of prevention and incident response. The report invites federal and private sector partners to accelerate initiatives to enhance data collection, detect events, raise awareness, and respond to incidents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Gas Pipeline Companies Under Major Cyber Attack

May 07, 2012 Added by:Headlines

“Analysis of the malware and artifacts associated with these cyber attacks has positively identified this activity as related to a single campaign from a single source. It goes on to broadly describe a sophisticated 'spear-phishing' campaign..."

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: The Role of Fusion Centers

May 03, 2012 Added by:Infosec Island Admin

ICS-CERT recommends that industrial control systems owners and operators contact their local fusion center to better understand the role of their fusion center in supporting the private sector in critical infrastructure protection and cybersecurity...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Military Advocates Cyber Offensive Capability

May 02, 2012 Added by:Headlines

“If this represents the official line of thinking, this means that the prospects are not good that a limited conflict in a Taiwan Straits would remain localized to that geography without escalating into an all-out war,” said Chinese cyber warfare expert Dmitri Alperovitch...

Comments  (0)

3750d420f6c2a9844b529978894dc0be

Data (In)Security Will Impact Presidential Election Race

May 01, 2012 Added by:Josh Shaul

Breaking into poorly protected government systems and revealing personal or financial information, stealing and posting lists of campaign donations, or corrupting electronic voting systems – these tactics are available to those with expertise and funding...

Comments  (0)

296634767383f056e82787fcb3b94864

SEALs, Spies, Security, and Celebrity

May 01, 2012 Added by:Jeffrey Carr

When the largest security companies in the world have had their source code stolen by hackers, our present security model is broken. Matt Brazil, a former U.S. embassy commercial officer in Beijing, will show executives how to survive in China without losing their secrets...

Comments  (0)

4289a029dd052b867dafc6cdf5bde53b

Procrastination in Cybersecurity Legislation

April 29, 2012 Added by:Michelle Valdez

Congress is procrastinating with regards to cybersecurity legislation. The debates will continue about regulation and authorities and privacy rights but in the end, we all need to come together and find the best way to share threat data so that we can protect critical networks...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Cybersecurity Legislation Needed to Prevent Inevitable Attack

April 28, 2012 Added by:Dan Dieterle

U.S. networks would be much stronger if companies enforced standard security procedures. My question is why hasn’t critical infrastructure entities already implemented it? And why would we need more legislation passed to force them to do it, when it should already be done?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

GAO: 680 Percent Increase in Government Cyber Attacks

April 27, 2012 Added by:Headlines

The GAO's Gregory Wilshusen testified before a House Homeland Security Committee's subcommittee about the marked increase in cyber attacks against U.S. government systems, which have increased 680% over a five year period, from 5,503 in 2006 to 42,887 in 2011...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

House Testimony: Iran Preparing Attacks on U.S. Infrastructure

April 26, 2012 Added by:Headlines

Cybersecurity experts will testify before Congress today on the high probability that the Iranian government is engaged in building a cyber offensive force geared towards attacks against critical U.S. infrastructure targets including power and water distribution facilities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressional Testimony Rings Cybersecurity Alarm Bells

April 25, 2012 Added by:Headlines

"Every day nations and 'hacktivist' groups penetrate our public and private computer networks. The degradation of our national security and intellectual property from cyber theft threatens to weaken us where we have been historically strong: in our ingenuity and creativity..."

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »