Items Tagged with "Government"


306708aaf995cf6a77d3083885b60907

Suits and Spooks DC 2015: The Agenda - Last Chance to Register

January 29, 2015 Added by:Mike Lennon

Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.

Comments  (2)

76e662e7786bf88946bd6c010c03ac65

Cyber Security Goes Ballistic

April 16, 2013 Added by:Jarno Limnéll

Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

Defining the Qualities of Cyber Warfare

February 14, 2013 Added by:Jarno Limnéll

Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

How the US is Preparing for Cyber Warfare

January 29, 2013 Added by:Pierluigi Paganini

The US and Israel are considered in cyber warfare context to be the most advanced nations, and according the international press they have been been involved in the creation of the first worldwide recognized cyber weapon, Stuxnet, and many other related spy tools kits such as Flame...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Perfect Citizen, US vulnerability assessment program on critical infrastructures

January 02, 2013 Added by:Pierluigi Paganini

CNET web site has published a news on a secret National Security Agency program named Perfect Citizen that is targeting on large-scale the control systems inside utilities, including power grid and gas pipeline controllers, with the purpose to discover security vulnerabilities.

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Dutch, the Yanks, the Cloud and YOU

December 13, 2012 Added by:Don Eijndhoven

Recently a research project by the Amsterdam University [PDF Alert] revealed that US law allows for the US government to access information stored in the Cloud, by (ab)using the PATRIOT act...

Comments  (0)

296634767383f056e82787fcb3b94864

Flipping Malware: A Profit Opportunity for Corporate IT Departments

December 09, 2012 Added by:Jeffrey Carr

Some of the more forward-looking DOD contractors who have robust internal CERT with engineers who do reverse-engineering could be in the best position to offer free or low-cost network defense to corporations who want to "flip" the malware found on their network for a nice profit...

Comments  (1)

54a9b7b662bfb0f0445d1661d7ed180b

Who Needs Words for Wars?

December 09, 2012 Added by:Jayson Wylie

This article holds little validity in my mind and I’m sure that runs up the chain of the Government to President Obama who is the only one, at this time, that seems to be able to have a majority consensus for a direction or secret directives for Cyberspace activities, rules and laws...

Comments  (0)

296634767383f056e82787fcb3b94864

HostDime, SoftLayer, et al, Need to be Federally Bitch-Slapped For Violating Syrian Sanctions

November 30, 2012 Added by:Jeffrey Carr

When the New York Times released its story that some of the Syrian government's websites were hosted outside of Syria, I wasn't surprised to see SoftLayer as one of the hosts. They are the company that hosted StopGeorgia.ru, the Russian forum which coordinated many of the cyber attacks...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Our Massively Dysfunctional Cyber System

November 28, 2012 Added by:Joel Harding

What should be done to stop theft of intellectual property by state actors (China) would require a Presidential Finding but our leadership structure is devoid of real leaders. That is not a political statement, that is a statement about our country...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Google Transparency Report: Let's Read it Together

November 17, 2012 Added by:Pierluigi Paganini

Government surveillance is one of the most interesting security topics. In many cases governments for various reasons, such as Homeland Security, spy on users tracking their activities on the Internet, intercept their communications, and gain access to email accounts...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

US Cyber Security Direction

November 07, 2012 Added by:Jayson Wylie

President Obama stated an Executive Order to be instilled which may be in a better direction but nothing definitive or out yet nor am I expecting a solid direction or hitting upon the finer notes in the short term. Let’s not kid ourselves. Having a point-of-presence on the Internet is dangerous...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Canada´s audit on cyber threats to national critical infrastructure

October 25, 2012 Added by:Stefano Mele

The Office of the Auditor General of the Canada revealed in an audit made public October 23 that "the cyber threat environment is evolving more rapidly than the Canada government´s ability to keep pace"...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Fact Checking Obama's Misleading Answer About Warrantless Wiretapping

October 24, 2012 Added by:Electronic Frontier Foundation

Jon Stewart boldly went where no mainstream reporter has gone: asking President Obama why he embraced Bush’s warrantless wiretapping program after campaigning against it. While Stewart’s question was commendable, Obama’s answer was puzzling because it seems so obviously untrue...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous vs Wikileaks...you can condemn a man but not wipe out an ideology

October 18, 2012 Added by:Pierluigi Paganini

Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for this reason security expert all over the world are trying to deeply analyze the different movements of dissent and their mutual relationships...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The Derecho Named Cyber

October 10, 2012 Added by:Joel Harding

The discussions we had back in the mid-90s are still ongoing, we still don’t have a proper information sharing cybersecurity bill and people still don’t trust the government to maintain their privacy. Please, members of congress and business leaders, work on cybersecurity as if our lives depend on it...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »