Items Tagged with "Cyber Security"


800ca77bf7ad76b2a830356569e524b7

How to Fight and Win the New Cyberwar

August 13, 2012

We are losing the cyberwar. What we are doing now not won't work and can't work because the net-centric defense approach is fundamentally flawed. This presentation includes a history of the battlefield because it's important to understand how we got in this mess in order for us to craft an effective solution...

Comments  (5)

0ff0a77035f9569943049ed3e980bb0d

When to Strike Back: Mitigative and Retributive Counterstriking

August 10, 2012

Our information and cyber security perimeters and infrastructures are battered daily by scores of probes, scans, and attacks. We stand in defensive posture ducking, bobbing and weaving as we try to avoid the offensive onslaught. It is a losing proposition. Isn't it time we started striking back?

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Role of the CIO: What’s Really at Stake

August 08, 2012 Added by:Robert Siciliano

The CIO has become as important as the CEO. It’s a pivotal position that often can make or break the success of a corporation. As criminal hackers have launched campaigns against numerous organizations, the CIO has become much more than an information officer. They are the guardian of corporate secrets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Center for Internet Security Joins NACo Cyber Security Task Force

August 08, 2012 Added by:Headlines

"In today's world where cyber has become a strategy in war, America's Counties are key players in homeland security; commissioners, supervisors, and local policy makers have to become educated on this issue and be ready to protect our citizens from breaches of confidentiality and more..."

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Top Cyber Security Experts Meet for Smart Grid Security Summit

August 07, 2012 Added by:Larry Karisny

From securing Intrusion Prevention Systems (IPS) that now must securely encrypt the new end point of nano sensors chip sets to Intrusion Detection Systems (IDS) that must now be able to view real time event anomalies and business processes, this discussion showed the need for security technology change...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Government Hackers: Party in the NSA

August 02, 2012 Added by:Bill Mathews

General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Why the NSA Can’t Be Trusted to Run Cybersecurity Programs

August 01, 2012 Added by:Electronic Frontier Foundation

Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

New Cybersecurity Bill Patches Serious Vulnerabilities

July 24, 2012 Added by:Electronic Frontier Foundation

We remain unpersuaded that any of the proposed cybersecurity measures are necessary and we still have concerns about certain sections of the bill, especially the sections on monitoring and countermeasures. But this was a big step in the direction of protecting online rights...

Comments  (0)

5cbe1364caf51f95cac6484a832d66d0

The "Compliance Society"

July 23, 2012 Added by:Bob Radvanovsky

I am quickly growing weary of the fact that individuals claiming to be "cybersecurity" or "critical infrastructure" subject-matter experts (or "SMEs"), are indicating that adherence to a regulatory requirement or compliance governance means that something is "secured". Let's get one thing straight...

Comments  (5)

0ff0a77035f9569943049ed3e980bb0d

Cyber Intelligence and Open Source Techniques

July 23, 2012

The National Counterintelligence Executive states that counterintelligence plays a critical role in reversing the benefits that cyber operations afford our adversaries. Cyber intelligence collection and analysis increases our understanding of the adversary and how to defend against them...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

NATO Offers Cyber Defense Awareness Online Course

July 23, 2012 Added by:Infosec Island Admin

The NATO Cooperative Cyber Defence Centre of Excellence has developed an online Cyber Defence Awareness course that aims to enhance the general user’s awareness of cyber security risks and measures to mitigate those risks. The course may be accessed through the NATO Joint Advanced Distributed Learning portal...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

UK Intelligence and Security Committee Annual Report

July 20, 2012 Added by:Stefano Mele

"There appears to have been some progress on developing cyber capabilities. However, cyber security is a fast-paced field and delays in developing our capabilities give our enemies the advantage. We are therefore concerned that much of the work to protect UK interests in cyberspace is still at an early stage..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senators Seek Investigation into Electric Grid Security Issue

July 20, 2012 Added by:Headlines

"These certificates protect access to control systems. They protect access to a $400 billion market. They protect access to trading systems. They also protect access to machines that do things like turn generators off. If you issue a fraudulent certificate or you're lax... the consequences could be disastrous..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Energy Department Develops Tool for Electric Grid Cybersecurity

July 19, 2012 Added by:Headlines

“The new Cybersecurity Self-Evaluation Survey Tool for utilities is vitally important in today’s environment where new cyber threats continue to emerge. Adoption by the electric sector will further protect critical infrastructure and... provide an invaluable view of the industry’s cybersecurity capabilities.”

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

English Translation of the Dutch Defense Cyber Strategy

July 18, 2012 Added by:Matthijs R. Koot

The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

So You Want to Hire a Hacker?

July 17, 2012 Added by:Ali-Reza Anghaie

The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »