Items Tagged with "National Security"


69dafe8b58066478aea48f3d0f384820

National Security Leaders Urge Passage of Cybersecurity Bill

June 11, 2012

“Given the time left in this legislative session and the upcoming election this fall, we are concerned that the window of opportunity to pass legislation that is in our view critically necessary to protect our national and economic security is quickly disappearing,” the letter states...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cybersecurity: Washington DC is a World of Grey

June 07, 2012 Added by:Joel Harding

The US State Department cannot sign many treaties in cyberspace, and we cannot establish a lot of cooperation, because there is a lack of a definition or there is no established threshold for most of what we deal with. Part of that problem is that as soon as the ink dries, most of the conditions will change...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Hosts White House Cyber Jobs Event

June 06, 2012 Added by:Marjorie Morgan

"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Opens Investigation into Stuxnet Attack Leaks

June 06, 2012 Added by:Headlines

The FBI is probing the source of recently leaked information regarding covert cyber operations conducted by the U.S. government, particularly the Stuxnet attacks. Stuxnet is largely considered to be a game changer because the virus affected kinetic damage on equipment the targeted systems controlled...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

DOE: Twenty-One Steps to Improve SCADA Security

June 05, 2012

Action is required by all organizations to secure their SCADA networks as part of the effort to protect the nation’s critical infrastructure. The President’s Critical Infrastructure Protection Board and the Department of Energy have developed steps to help organizations improve SCADA security...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Stuxnet: Classified Disclosures for Political Gain

June 04, 2012 Added by:Joel Harding

Operations Security or OPSEC is strictly enforced in the military, this is one of the basic tenets of Information Operations. We have had problems with Senators and Congressmen in the past disclosing classified information when doing so suited their purpose. Now the President has become the “Discloser in Chief”...

Comments  (8)

Bd623fa766512fdf6b57db66f522b741

The Next War on Terror Will Be (Lost) Online

May 31, 2012 Added by:Ali-Reza Anghaie

Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Memorial Day – A Big Thank You

May 27, 2012 Added by:Thomas Fox

Today is Memorial Day, the day we celebrate the men and women who have served our country in our armed forces. I would ask each of you to honor our veterans, even if it is just a moment to reflect on those who made the ultimate sacrifice in giving their lives to protect the rest of us...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iranian Hackers Hit NASA: Isolated Attack or Act of Cyberwar?

May 24, 2012 Added by:Pierluigi Paganini

Hackers have written an HTTPS protocol scanner to find weaknesses in the NASA website. A NASA spokesman hasn't denied the hack, and the agency is investigating the event. Is it an isolated operation conducted by a group of hackers, or a state-sponsored act of cyberwar?

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

FBI: Al-Qaeda Video Calls for Electronic Jihad against the US

May 24, 2012 Added by:Dan Dieterle

A 6 minute Al Qaeda video translated by the FBI calls for extremist followers to perform cyber attacks against the US. The video states that US computer systems are as vulnerable to electronic warfare as airline security was leading up to the 9/11 attacks...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

DHS: Enabling Distributed Security in Cyberspace

May 24, 2012

This discussion paper explores the idea of a healthy, resilient – and fundamentally more secure – cyber ecosystem of the future, in which cyber participants, including cyber devices, are able to work together in near‐real time to anticipate and prevent cyber attacks...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Security: Back to the "Made in the USA" Tradition

May 23, 2012 Added by:Jayson Wylie

The US government’s Department of Defense had, and may still have, issues with counterfeit components being procured and used in military weapons, vehicles and equipment. It’s a national security issue when the supply chains are compromised by weaknesses and scams...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Notes on Electromagnetic Pulse (EMP) in US, UK, NL

May 22, 2012 Added by:Matthijs R. Koot

In 2009, there was a discussion on a forum for pilots about an article that argued that a commercial aircraft could be brought down by DIY EMP bombs. Also in 2009, the U.S. Patent Application for an Electromagnetic pulse (EMP) hardened information infrastructure was filed...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Hard Power, Soft Power, and the Power of Digital Espionage

May 21, 2012 Added by:Infosec Island Admin

By combining the military, the economic, and the political aspects of soft and hard power, and the gray’s in between, China has become a force to be reckoned with. In order to better understand the mosaic, we need to re-tool some of the ideas we have preconceived for ourselves...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

US vs. China: Is the Cyber Warfare Gap Increasing?

May 21, 2012 Added by:Pierluigi Paganini

"We continue to see China expressing interest in making investments to improve their capacity for operations in cyberspace, and that is something that we pay very, very careful attention to. There is the potential for these types of operations to be very disruptive..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Developments Involving the People’s Republic of China

May 21, 2012 Added by:Headlines

"In 2011, computer networks and systems around the world continued to be targets of intrusions and data theft, many of which originated within China. Although some of the targeted systems were U.S. government-owned, others were commercial networks owned by private companies..."

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »