Blog Posts Tagged with "National Security"

69dafe8b58066478aea48f3d0f384820

White House: Big Data is a Big Deal

April 05, 2012 Added by:Headlines

By improving our ability to extract knowledge and insights from large and complex collections of digital data, the initiative promises to help accelerate the pace of discovery in science and engineering, strengthen our national security, and transform teaching and learning...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Coming Soon: FUD FUD FUD!

April 03, 2012 Added by:Infosec Island Admin

The terrorists may aspire to this, as nebulous as that aspiration can be from an image like the one in question. This in NO WAY means we are doomed or that NYC will be seeing an attack like 9/11 again directly relating to this piece of so called artwork...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Real Questions about Huawei for US Rep. Frank Wolf

April 03, 2012 Added by:Joel Harding

The Congressman was obviously attempting to either persuade the US China Economic and Security Commission or reassure them about Huawei. He passionately made a one-sided statement but failed to provide any evidence aside from one news report in that day’s Washington Post...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Taking the Crowbar to Cyber-Denying Eyes

April 03, 2012 Added by:Don Eijndhoven

Making your own arbitrary definition of Cyber Warfare and discounting MOUNTAINS of evidence that undermine your point isn't very scholarly to say the least. Can we please stop giving a stage to these people who are obviously cherry-picking their way to an uninformed argument?

Comments  (9)

69dafe8b58066478aea48f3d0f384820

Rogers-Ruppersberger Cyber Bill Gains Momentum

April 02, 2012 Added by:Headlines

“Every day U.S. businesses are targeted by nation-state actors like China for cyber exploitation and theft. This consistent and extensive cyber looting results in huge losses of valuable intellectual property, sensitive information, and American jobs..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DOD Needs Industry’s Help to Battle Cyber Attacks

March 29, 2012 Added by:Headlines

“Today, we’re in the forensics mode. We need to see the attack. If we can’t see the attack, we can’t stop it. We have to have the ability to work with industry - our partners - so that when they are attacked, they can share that with us immediately,” said Gen. Keith Alexander...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Rep. Frank Wolf: What’s with You and Huawei?

March 28, 2012 Added by:Joel Harding

What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Huawei Symantec: Fear of Chinese Espionage Ends Venture

March 27, 2012 Added by:Pierluigi Paganini

While I understand the defensive approach, I believe that such behavior could have serious repercussions on the global market. In terms of security, little will change by breaking strategic alliances. Cyber attacks will continue and will increase in frequency and efficiency...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CyberPatriot Announces National Championship Winners

March 27, 2012 Added by:Headlines

“CyberPatriot has introduced the area of cyber defense to tens of thousands of students across the country, and they’ve embraced the opportunity to learn and develop the skills to be successful in a field critical to America,” said Bernie Skoch, CyberPatriot Commissioner...

Comments  (0)

296634767383f056e82787fcb3b94864

The Real Reason Symantec Sold its Interest in Huawei Symantec

March 27, 2012 Added by:Jeffrey Carr

While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Northern Command Makes Cyber Security a Priority

March 26, 2012 Added by:Headlines

Northcom's responsibility in the cyber domain "is consequence management in the event of a catastrophic cyber attack on this country. Northcom could certainly be called upon to provide support to civil authorities in the recovery. But we think our role is broader..."

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks are Fastest Growing National Security Threat

March 22, 2012 Added by:Bill Gerneglia

Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century. The opportunity for cyber attacks grows daily...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Lawmakers Continue Clash Over Cybersecurity Legislation

March 22, 2012 Added by:Headlines

“It is critical that we strengthen our cybersecurity posture, and we urge Congress to recognize the need for new tools to more effectively prevent and respond to potential cyber attacks on the homeland..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Defense Department Finalizing Cyberwar Operations Guidelines

March 21, 2012 Added by:Headlines

“I think the capabilities are available in cyber to virtually cripple this nation, to bring down the power grid system, to impact on our governmental systems, to impact on Wall Street on our financial systems, and literally to paralyze this country..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Pentagon Networks Hacked 250,000 Per Year

March 21, 2012 Added by:Rafal Los

Unfortunately, I suspect that if this actually happened at the Pentagon a quarter million times a year, America would be in a much, much worse position than we are today. Our battle plans would be compromised, launch codes, schematics, and covert identities would be compromised...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Nuclear Facility Networks "Under Constant Attack"

March 20, 2012 Added by:Headlines

"Stuxnet showed that airgapping is not a perfect defense. Even in secure systems, people stick in their thumb drives, they go back and forth between computers. They can find vulnerabilities that way. If people put enough attention to it, they can possibly be penetrated..."

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »