Blog Posts Tagged with "Defense"

211571f3e14099fd9a6c172426982ca5

Deceptioneering: Exploring How Humans Are Wired for Deception

September 23, 2017 Added by:Perry Carpenter

No matter how much security technology we purchase, we still face a fundamental security problem: people. They are both our biggest threat and they serve as our last line of defense.

Comments  (0)

924ce315203c17e05d9e04b59648a942

Three Keys to Managing Firewalls for Better Security

September 25, 2012 Added by:Richard Stiennon

The that firewalls do not provide value had its first incarnation in de-perimeterization. The idea is that because network security is so hard we should give up and focus on securing the endpoints and data that travels between them. In reality we have to defend four separate domains...

Comments  (1)

48062676f7b2fc521b0b32a3c6494469

On NATO and Cyber Warfare

June 20, 2012 Added by:gaToMaLo r. amores

"Threats are rapidly evolving both in frequency and sophistication. Threats emanating from cyberspace – whether from states, hacktivists or criminal organizations, among many others – pose a considerable challenge to the Alliance and must be dealt with as a matter of urgency"...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Securing the Virtual Environment: How to Defend Against Attack

June 06, 2012 Added by:Ben Rothke

One of the selling points around virtualization is its perceived added level of security. But virtualization, like any other piece of software can be implemented incorrectly, and itself have flaws. To secure virtualization effectively, one needs to understand how adversaries will attack an environment...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Memorial Day – A Big Thank You

May 27, 2012 Added by:Thomas Fox

Today is Memorial Day, the day we celebrate the men and women who have served our country in our armed forces. I would ask each of you to honor our veterans, even if it is just a moment to reflect on those who made the ultimate sacrifice in giving their lives to protect the rest of us...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Notes on Electromagnetic Pulse (EMP) in US, UK, NL

May 22, 2012 Added by:Matthijs R. Koot

In 2009, there was a discussion on a forum for pilots about an article that argued that a commercial aircraft could be brought down by DIY EMP bombs. Also in 2009, the U.S. Patent Application for an Electromagnetic pulse (EMP) hardened information infrastructure was filed...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Military Intelligence Dives into Cyber

May 21, 2012 Added by:Don Eijndhoven

One of the most interesting facts extracted from the report is that the MIVD will focus the majority of its cyber warfare efforts in countering espionage. Given that this is probably the most tangible and widely represented cyber activity currently employed, this is a wise choice...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Vice Commander: Everyone is Focused on Cyber

April 20, 2012 Added by:Headlines

"The enemy will be inside our networks for malice, curiosity, or just for the challenge. We must prioritize our defense efforts with a mission assurance approach... Cyberspace is a part of every war fight, every mission that we're in. Everyone is focused on cyber...."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD to Expand International Cybersecurity Cooperation

April 16, 2012 Added by:Headlines

“I think it’s very important to do as much as we can to prevent and mitigate the threat at home, but we can only get so far acting unilaterally. We have to act in concert… with countries around the world to address this problem...”

Comments  (1)

91648658a3e987ddb81913b06dbdc57a

Projectile Dysfunction

April 13, 2012 Added by:Ron Baklarz

Was it me or when they showed the North Korean Space Control Center did it not look like a group of students at a code fest? Seriously, there were no large screens for tracking and I’ve seen more computing power at the local senior citizens home...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

DoD Comments on Cyberwar and the Law of Armed Conflict

April 13, 2012 Added by:Headlines

“We’re trying to think about cyber operations as a new form of policy tool that gives the president or the secretary of defense new options. We’re not actively looking to mount operations in cyberspace... We want to do it only when appropriate and when there’s a good reason to.."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Army's First Dedicated Cyber Brigade Now Operational

March 19, 2012 Added by:Headlines

"It’s a very complex threat—pervasive, evolving, highly intelligent, very adaptive to our countermeasures. It ranges from nation-states to non-nation-state actors, criminal elements and individual hackers... It’s a wide and varied threat we have to defend against..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Strategic Command on Defending Cyberspace

February 07, 2012 Added by:Headlines

DoD networks and personnel are being tested to the very limits of their ability to deflect assault. Attackers all over the world are utilizing every conceivable method to gain access to our critical systems and introduce malicious code to exploit or destroy our assets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Leaders Urge Congress to Act on Cyber Laws

February 06, 2012 Added by:Headlines

Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Evidence of Chinese Attacks on US Defense Contractors

January 30, 2012 Added by:Pierluigi Paganini

At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »