Blog Posts Tagged with "Cyber Defense"

44a2e0804995faf8d2e3b084a1e2db1d

Real Bullets for Digital Attacks

February 09, 2012 Added by:Don Eijndhoven

In May of last year, the US Government published its International Strategy for Cyberspace. The publication made some waves in the international community because in this document the US stated that military reprisals to cyber attacks were now officially on the table...

Comments  (3)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: Hacks, Breaches, and Disclosures

February 08, 2012 Added by:Cyber Defense Weekly

"Us law firms have been penetrated both here and abroad. Firms with offices in China and Russia are particularly vulnerable, because the foreign security services are likely to own the people who handle the the firms' physical and electronic security..."

Comments  (0)

48ee5cc2faa38ddec15846777f57f1a6

Hidebound Governments Unprepared for Cyber Threats

February 05, 2012 Added by:James Colbert

“Even if they brilliantly secure their networks, the greatest threat that organizations face is that they are still vulnerable if their minimum wage security guards are disgruntled or their physical access control systems can be easily bypassed...”

Comments  (0)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: Anonymous Attacks, Dutch Cyber Strategy

January 24, 2012 Added by:Cyber Defense Weekly

Each attacker only has so much time and energy. It's like trying to get a crowd at a stadium to do the wave. As soon as the pitcher winds up on the mound the wave peters out. What should you do if you are the target of an Anonymous DDoS attack? Just wait, they will go away...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

China’s “Online Blue Army” Ready

January 19, 2012 Added by:Dan Dieterle

Growing up I heard numerous times that the Soviet's needed so many missiles to protect it’s vast land mass from aggressors. Everyone knew that the large missile stockpile was more of a threat than a safety net. It seems that China may be trying to play the same card...

Comments  (0)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: Symantec, Stratfor and SOPA

January 16, 2012 Added by:Cyber Defense Weekly

Internet companies are contemplating shutting down their sites in a day of protest against the egregious SOPA; Japan has contracted with Fujitsu to produce anti-malware malware; Symantec's source code has been stolen by a group of Indian hackers associated with Anonymous...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Dutch Launch National Cyber Security Centre (NCSC)

January 13, 2012 Added by:Headlines

The NCSC is a public-private partnership and has the ambition to grow, in a phased manner, into the cooperation platform for cyber security in the Netherlands. Initially, the NCSC will focus on shaping the closer cooperation between the various agencies of the central government...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Defense Secretary Panetta: Cyber Attack Could Paralyze US

January 06, 2012 Added by:Headlines

"I think we have to be prepared not only to defend against that kind of attack but if necessary we are going to have to be prepared to be able to be aggressive when it comes to cyber efforts as well. We've got to develop the technology, the capability, we've got to be able to defend this country..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyber India: A Country Full of Contradictions

January 05, 2012 Added by:Pierluigi Paganini

India is increasingly targeted for cyber espionage, cyber warfare, cyber terrorism, but its response to the same is not so energetic. Consider that India still has not formulated a cyber warfare policy and, as usual, the word cyber security, in the country has no meaning...

Comments  (0)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense: Welcome to 2012 and Interesting Times

January 05, 2012 Added by:Cyber Defense Weekly

2011 was the year that state sponsored hacking finally came to national attention with hundreds of articles exposing the continued industrial and military cyber espionage credited to the likes of China and Russia. We can be sure that 2012 will bring more of the same...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Experts Warn Against Developing Cyber Weapons

January 04, 2012 Added by:Headlines

“The Japanese model represents a communicated and demonstrated increase in virtual arms escalation. It ups the ante to a new level that may not be sustainable, especially when -- not if -- the code for the 'good' virus gets out...."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Japanese Defense Ministry Developing Cyber Weapon

January 03, 2012 Added by:Headlines

"The program can identify the source of a cyber-attack to a high degree of accuracy for distributed denial of service (DDoS) attacks, as well as some attacks aimed at stealing information stored in target computers...."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Iran Invests Heavily in Developing Cyberwarfare Capabilities

December 19, 2011 Added by:Headlines

The Jerusalem Post reports Iran has recently decided to invest somewhere near one billion dollars to increase both cyber defensive and offensive capabilities. The news comes on the heels of reports that Iran may now be in possession of several advanced U.S. military reconnaissance drones...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Exercise Tested NATO Procedures for Cyber Defense

December 16, 2011 Added by:Headlines

“Effective cyber defense requires us to continually test and improve our crisis management and decision-making procedures. This exercise was a great opportunity to promote the practical implementation of NATO’s new Cyber Defense Policy adopted last June..."

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Collision of Physical and Digital Defenses

November 30, 2011 Added by:Rafal Los

With all the SCADA hacking lately we have to let reason guide us, and emphasize temperance while we develop our own defensive capability in the digital age. It's too easy to just say "strike the attacker" but much harder when that attacker is a virtual ghost in the fabric of cyberspace...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare - Questions from .GOV

November 08, 2011 Added by:Don Eijndhoven

People ask what the impact may be from cyber warfare, and this is a valid question. However, it should not be confused with political and/or military motive. War is, as Clausewitz said, the continuation of policy through other means, and that is what cyber is, another means...

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »