Blog Posts Tagged with "National Security"

69dafe8b58066478aea48f3d0f384820

Air Force Wins NSA's 12th Annual Test of Cyber Defense

April 25, 2012 Added by:Headlines

The cybersecurity skills and ingenuity of students from the U.S. service academies, the Air Force Institute of Technology, and the Royal Military College of Canada were put to the test by the National Security Agency's top information assurance professionals...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mike Locatis Named Assistant Secretary for Cybersecurity

April 25, 2012 Added by:Headlines

DHS announced the appointment of Michael W. Locatis III as the new Assistant Secretary for Cybersecurity and Communications (CS&C) at the National Protection and Programs Directorate. Locatis brings a wealth of experience in information management, cybersecurity and public safety...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

House Republicans Declare Cyber Security Week

April 23, 2012 Added by:Headlines

"The focus of these bills... address the central issue the federal government and industry have stated must be addressed now: updating existing cybersecurity laws to provide the legal authorities to allow for information-sharing and public-private partnerships..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Vice Commander: Everyone is Focused on Cyber

April 20, 2012 Added by:Headlines

"The enemy will be inside our networks for malice, curiosity, or just for the challenge. We must prioritize our defense efforts with a mission assurance approach... Cyberspace is a part of every war fight, every mission that we're in. Everyone is focused on cyber...."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Commander Discusses Cyber Operations

April 19, 2012 Added by:Headlines

"My mission focus, [is] just like in any other domain - whether it is ground, sea, air or space - the same is true for cyber: we are responding to orders and guidance that support this nation in its responsibilities and national security efforts around the globe..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Officials Examine the Militarization of Cyberspace

April 16, 2012 Added by:Headlines

"If there is significant information of a cyber-event, we reserve the right to use tools in our toolbox,. When does a cyber-attack achieve critical level? When one can attribute an attack that deliberately causes loss of life," a U.S. official stated...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD to Expand International Cybersecurity Cooperation

April 16, 2012 Added by:Headlines

“I think it’s very important to do as much as we can to prevent and mitigate the threat at home, but we can only get so far acting unilaterally. We have to act in concert… with countries around the world to address this problem...”

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DoD Comments on Cyberwar and the Law of Armed Conflict

April 13, 2012 Added by:Headlines

“We’re trying to think about cyber operations as a new form of policy tool that gives the president or the secretary of defense new options. We’re not actively looking to mount operations in cyberspace... We want to do it only when appropriate and when there’s a good reason to.."

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

AQ Air: Mostly Hot - Not So Interesting

April 12, 2012 Added by:Infosec Island Admin

In the rar file that was uploaded to multiple locker sites were five video files that were taken from the internet and re-purposed for the release. Metadata from the files shows that they were handled on a Windows machine using the following software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Officials Warn of Global Cyber Arms Race

April 11, 2012 Added by:Headlines

"What we're looking at is a global cyber arms race. It's not proceeding at a leisurely or even a linear fashion but in fact is accelerating. I wouldn't claim that it's following Moore's law, but the curve looks kind of similar," said U.S. Cyber Command's Rear Admiral Samuel Cox...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

An Anatomy of US Cyber Command

April 10, 2012 Added by:Dan Dieterle

When you think of USCYBERCOM, the Air Force comes to mind immediately. Since the beginning, the Air Force has been a driving force behind US Cyber War. But there is another group that is more responsible for the creation of USCYBERCOM and actually forms the Command’s backbone...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

National Collegiate Cyber Defense Competition 2012

April 09, 2012 Added by:Headlines

"Our nation is under constant attack... from individuals stealing personal financial information to sophisticated terrorist networks seeking to hack into our electrical grid and be a detriment to our way of life. Our nation continues to seek out and employ the best and brightest..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Commander Leads Air Force Cyber Warriors

April 09, 2012 Added by:Headlines

As commander of 50 NOG, Sutherland is responsible for 1,500 military, DoD civilian and contractor personnel assuring access to cyberspace by operating and maintaining the $6.2 billion Air Force Satellite Control Network and the $100 million communications and information gateway...

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

Meetings with DOD and Congress on SCADA Security

April 09, 2012 Added by:Joe Weiss

I was asked by DOD how to get an organization to address OT security. The only chance for OT security to succeed is if senior management drives it. There are only a few utilities whose senior management mandated they be secure not just compliant. What a sorry commentary...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Cybersecurity Problems Found in Electrical Infrastructure

April 07, 2012 Added by:Joel Harding

DOE is in charge of locating and fixing critical infrastructure problems within the energy sector. Do they, in turn, report to DHS if it has to do with critical infrastructure? Does DHS oversee DOE’s cybersecurity problems, their critical infrastructure problems or...?

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Infosec: The Eternal Struggle

April 06, 2012 Added by:Infosec Island Admin

The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »
Most Liked