Federal

69dafe8b58066478aea48f3d0f384820

DHS Officials Deny Hack of Illinois Water Systems

November 23, 2011 Added by:Headlines

While news that there was not a systems breach at the facility is certainly welcome, the conclusions of ICS-CERT and the FBI fail to provide an explanation as to why the Illinois Statewide Terrorism and Intelligence Center initially believed the facility had been compromised...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

ICS-CERT and FBI Statements on Water System Attacks

November 22, 2011 Added by:Headlines

ICS-CERT has not received any additional reports of impacted manufacturers of ICS or other ICS related stakeholders related to these events... any information about possible impacts to additional entities, it will disseminate timely mitigation information as it becomes available...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Department of Defense Cyberspace Policy Report

November 18, 2011 Added by:Headlines

"While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DARPA Advocates Improved Cyber Offense Capabilities

November 07, 2011 Added by:Headlines

"We are shifting our investments to activities that promise more convergence with the threat and that recognize the needs of the DoD. Malicious cyber attacks are not merely an existential threat to our bits and bytes. They are a real threat to our physical systems..."

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

UK Security Strategy

November 02, 2011 Added by:Mark Gardner

I know things change at a rapid pace in It and Security but, as a Security Professional and a UK taxpayer, why the constant writing of strategies. Surely the best defense for the UK is to actually not give the details of what the government is proposing to do?

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Building a Backdoor

October 29, 2011 Added by:Joel Harding

A friend in another country wrote and asked me if the reason the United States suspected foreign equipment of containing a means of gaining surreptitious access to telecommunication, information or networked systems, commonly called a backdoor, was because the US routinely does it...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

The Economic Benefit of Cloud Computing

October 24, 2011 Added by:Kevin L. Jackson

In considering cloud computing for the Intelligence Community, security is an obvious concern. Classified information should always be processed in properly protected and certified IC private or community clouds. If a secure cloud model can be designed, economic savings can certainly be realized...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous, SCADA, Lulz, DHS, and Motivations

October 18, 2011 Added by:Infosec Island Admin

The motivations of DHS have also been called into question by some. This is especially prescient since they take pains to say that the Anonymous movement “most likely” does not have the technical means and motive to really pull of these types of attacks on the infrastructure. So why even bother?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Investment to Focus on Utility Control Systems

October 18, 2011 Added by:Headlines

“Unfortunately, one thing has not changed. Cyber security is still way behind the attackers. Even where strong countermeasures exist, they are not consistently deployed, and most sophisticated attackers look at smart grids from a systemic perspective..."

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

SEC to Enterprises: Account for Cybersecurity

October 14, 2011 Added by:Chris Blask

On October 13 the Securities and Exchange Commission (SEC) released CF Disclosure Guidance: Topic No. 2. This document establishes requirements for public companies to account for the cost of cybersecurity incidents and defenses, as well as to disclose their cyber risk mitigation plans to investors...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Experts, Charlatans, and the Intelligence Committee

October 14, 2011 Added by:Infosec Island Admin

We live in “Interesting Times” as the Chinese say, and we certainly do not need to have Congress led further astray by those without experience in the subject matters at hand. Lets hope that the House looks into Evans’ history and decides he is not an expert on any of the topics at hand...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Reducing America’s Cyberwar Capabilities to a Maginot Line

October 13, 2011 Added by:Dan Dieterle

The United States has been ravished electronically by infiltrating sources that have pilfered military secrets, financial information and account credentials. According to some, our national infrastructure has also been infiltrated and key systems backdoored...

Comments  (1)

509ea0c1f4a210534eb004d35c10aa2d

Tracking Cyber Security Legislation Updates

October 12, 2011 Added by:Marjorie Morgan

Everyone can track security legislation in Congress through the “Cybersecurity Legislation Tracker”. This is a valuable resource that provides notice and summaries of significant cybersecurity developments on Capitol Hill, including hearings, proposed bills, and task force activities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ISA Embraces House Recommendations on Cybersecurity

October 07, 2011 Added by:Headlines

"The system they have recommended provides a pathway for a sustainable system to of cyber security that will result in securing our nations critical infrastructure while stimulating the IT engine that has provided most of the good news our economy has experienced over the last 20 years..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressman Confronts China over Cyber Espionage

October 05, 2011 Added by:Headlines

“Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage..."

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Cloud Computing Solutions in Federal Agencies part 4

October 04, 2011 Added by:Kevin L. Jackson

Cloud computing is unique in its ability to address critical defense and intelligence needs. That’s why the cloud is critical to our national defense. As a bonus, cloud computing offers defense and intelligence agencies the ability to increase efficiency and incur cost savings...

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »