Items Tagged with "National Security"


0a8cae998f9c51e3b3c0ccbaddf521aa

SCADA Security: Consequences and Difficulty with Incentives

May 18, 2012 Added by:Rafal Los

Here's the problem - when it comes to critical infrastructure protection it's very difficult to legislate and regulate the organizations that matter into a state of better security. The problem is that in order to enforce policy and rules there either have to be consequences to failing, or incentives not to fail - or both...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Enhances Cybersecurity Collaboration with Australia

May 18, 2012 Added by:Headlines

This statement of intent will help enhance situational awareness and information sharing on cybersecurity issues, increase collaboration and sharing of cybersecurity best practices, and create opportunities for training and cooperation in cyber exercises...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Command Realigns Cyberspace Capabilities

May 18, 2012 Added by:Headlines

"As the lead major command for space and cyberspace, Air Force Space Command is chartered to organize, train and equip space and cyberspace forces and is tasked to review and efficiently use the resources assigned to the command," said Lt.Gen. Michael J. Basla...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House Cybersecurity Coordinator Howard Schmidt Resigns

May 17, 2012 Added by:Headlines

"It has been a tremendous honor for me to have served in this role and to have worked with such dedicated and professional colleagues both in the government and private sector. We have made real progress in our efforts to better deal with the risks in cyberspace..."

Comments  (0)

296634767383f056e82787fcb3b94864

China's Intelligence Apparatus: Implications for Foreign Firms

May 16, 2012

A business does not need to be located in the PRC to fall victim to espionage. This problem includes old fashioned spying outside of China, sometimes by a classic sleeper agents or by a PRC-owned or invested firm that assesses, develops, and recruits an agent inside your firm...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Has Anonymous Infiltrated the US Government?

May 16, 2012 Added by:Pierluigi Paganini

"Right now we have access to every classified database in the U.S. government. It’s a matter of when we leak the contents of those databases, not if. You know how we got access? We didn’t hack them. The access was given to us by the people who run the systems…"

Comments  (6)

5106d48203954b74e6ea495e5c7f21b0

No National 'Stand Your Cyberground' Law Please

May 14, 2012 Added by:William Mcborrough

We know that some attacks on our privately owned critical infrastructure have been attributed to foreign government networks. Would it be wise to license companies to attack these networks? The last thing we need is an international incident started by some SysAdmin..

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon CIO Discusses DoD's Cyber Defense Strategy

May 11, 2012 Added by:Headlines

"We deal with all aspects of cyber security. How to defend all our information. We have a lot of R&D to protect. There are those who want to get in and maliciously disable or damage or change information. We’re so heavily dependent on our network for a national security role..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Drones, Secret Surveillance, and Classifying the Wizard of Oz

May 10, 2012 Added by:Electronic Frontier Foundation

The FAA finally released the names of the government agencies which applied for and received authorization to fly drones in the US. Unfortunately, the list did not include what drones were authorized, what they were being used for, or what information they were collecting...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AQ, AQAP, BVD Bombs, CIA, INSPIRE, Media, Moles... Oh My

May 09, 2012 Added by:Infosec Island Admin

Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Legislation Would Stick Business with Cyberwar Costs

May 08, 2012 Added by:Headlines

"The legally mandated role of the government is to provide for the common defense, and they're willing to spend pretty much whatever it takes... If you're in a private organization, your legally mandated responsibility is to maximize shareholder value. You can't spend just anything..."

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

DHS: National Preparedness Report and Cybersecurity

May 08, 2012

Cyber attacks have increased significantly in number and sophistication resulting in the Federal Government and private sector partners expanding their cybersecurity efforts. US-CERT reported an over 650-percent increase in the number of incidents reported by federal agencies...

Comments  (0)

4289a029dd052b867dafc6cdf5bde53b

CISPA: The Devil is in the Details

May 07, 2012 Added by:Michelle Valdez

The problem with CISPA involves all the information added under one of the approved amendments. The vagueness about what information can be shared has caused most of the concern – especially that catch all category of “to protect the national security of the United States”...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

US Cybersecurity Capability: National Preparedness Report

May 07, 2012 Added by:Pierluigi Paganini

Cybersecurity is identified as a priority issue to enhance the efficiency of prevention and incident response. The report invites federal and private sector partners to accelerate initiatives to enhance data collection, detect events, raise awareness, and respond to incidents...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

ISA President Larry Clinton Discusses Cybersecurity Legislation

May 07, 2012

Private sector advocates such as Clinton believe some of the current legislation under consideration is far too punitive in nature, and would disincentivize companies from both investing in better security measures and from disclosing data loss events...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Gas Pipeline Companies Under Major Cyber Attack

May 07, 2012 Added by:Headlines

“Analysis of the malware and artifacts associated with these cyber attacks has positively identified this activity as related to a single campaign from a single source. It goes on to broadly describe a sophisticated 'spear-phishing' campaign..."

Comments  (1)

Page « < 3 - 4 - 5 - 6 - 7 > »