Items Tagged with "Military"


C4363f41d25c216c53c8d71a1ac44a90

English Translation of the Dutch Defense Cyber Strategy

July 18, 2012 Added by:Matthijs R. Koot

The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force's Tactical Cyber Wing Gets New Commander

July 17, 2012 Added by:Headlines

The 67th Network Warfare Wing is the Air Force's premier tactical cyber warfighting organization defending the Air Force network, transforming network operations, and providing full-spectrum capabilities across the Air Force enterprise and to U.S. Cyber Command and the Combatant Commanders...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet was Only the Beginning of US Cyberwar Against Iran

July 16, 2012 Added by:Headlines

"Almost all cyberattacks are 'to whom it may concern' but Stuxnet was a bullet with someone's name on it. Repeating something like Stuxnet or (computer virus) Flame will be much more difficult... But the defender needs to plug all holes, while the attacker need only find one..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

GAO: Aligning Electronic and Cyber Warfare Operations

July 16, 2012

DOD has taken steps to address a critical electronic warfare management gap, but it has not established a departmentwide governance framework for electronic warfare. DOD’s oversight of electronic warfare capabilities may be further complicated by its evolving relationship with computer network operations...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Department of Defense's Cloud Computing Strategy

July 12, 2012 Added by:Stefano Mele

The DOD has specific challenges that require careful adoption considerations, especially in areas of cybersecurity, continuity of operations, information assurance, and resilience. Additional challenges include service acquisition and funding, data migration and management, and overcoming network dependence...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Company Guilty of Illegal Export of U.S. Military Software to China

July 04, 2012 Added by:Headlines

“Preventing the loss of critical U.S. information and technologies is one of the most important investigative priorities of the FBI. Our adversaries routinely target sensitive research and development data and intellectual property from universities, government agencies, manufacturers, and defense contractors..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Drones Vulnerable to Hijacking, Raising Concerns for Security

July 02, 2012 Added by:Pierluigi Paganini

The problem is the security of these vehicles, which are based on high-tech components, and we know that nothing is totally secure. US drones are exploitable, possibly allowing hackers to take control. A team of researchers from the University of Texas at Austin recently conducted a successful hack...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch MoD Releases Defense Cyber Strategy

June 29, 2012 Added by:Don Eijndhoven

What makes this interesting is that they are declaring that non-combatants may also be actively targeted. In essence, they are putting the world on notice that if you’re involved with a cyber attack, part of a militia or a terrorist, you have a bull’s-eye on your head. No matter where you are. Plain and simple...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyber War: The Strategic Importance of Defense

June 25, 2012 Added by:Pierluigi Paganini

The discovery of new cyber weapons will be published with increasing frequency, the real question to ask is if the world is really prepared to respond to these attacks. The stakes are high, security is critical for every nation, and the whole world must be analyzed as a monolithic system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The DOD's Mobility Device Strategy Released

June 20, 2012

“This strategy is not simply about embracing the newest technology - it is about keeping the DoD workforce relevant in an era when information and cyberspace play a critical role in mission success," said Teri Takai, Department of Defense chief information officer...

Comments  (0)

296634767383f056e82787fcb3b94864

Breach Alert: Putin Makes Drone Development a National Priority

June 19, 2012 Added by:Jeffrey Carr

Russia plans to spend US$13B on UAS development over the next eight years. Part of that technology development strategy is almost certainly going to be acquiring intellectual property on related technology from foreign firms. Two good examples of companies at risk are Boeing and General Atomics...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Tweeting About Cyberwar and Other Ridiculous Ideas

June 19, 2012 Added by:Infosec Island Admin

I have said this before and I am saying it again, we are just monkeys with digital guns. Fools with tools really. I am afraid of the level of hubris here and frankly feel that it’s almost time to just become a Luddite. At least Luddites won’t be compromised by their toasters because China made malware to p0wn us...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Pentagon to Regionalize Cyber Response Capabilities

June 12, 2012 Added by:Headlines

“Although cyberspace presents some very unique characteristics, this transitional model is designed to continue DoD’s efforts at normalizing cyber as an integrated function with other land, maritime, air and space functions,” DoD spokesperson Lt. Col. April Cunningham said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Judge Upholds Charges Against WikiLeaker Bradley Manning

June 12, 2012 Added by:Headlines

Manning is accused of the largest intelligence leak in U.S. history while deployed to Iraq as a military intelligence analyst, including installing unauthorized software onto government computers to extract classified information and transmitting the data to the whistle-blowing group WikiLeaks...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cybergate: Stuxnet and Flame are Related

June 11, 2012 Added by:Joel Harding

Contrary to previous reports that Stuxnet and Flame were unrelated, the authors apparently worked together at one point. If this is the case we might begin looking for evidence of more code from Operation Olympic Games floating around. Flame provides a framework for future warfare in cyberspace...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

South Korea Moves to Improve Cybersecurity Posture

June 11, 2012 Added by:Headlines

"To the North, it is attractive to develop cyber capabilities as it does not cost much money to establish and maintain cyber units. Another reason is it is very difficult to trace down the origin of cyber attacks, which can be a good excuse when it is blamed for any cyber attack"...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »