Blog Posts Tagged with "Cyber Offense"
November 27, 2012 Added by:Pierluigi Paganini
Cyber conflicts are characterized by the necessity of an immediate cyber response to the incoming cyber threats, in many cases the reaction must be instantaneous to avoid the destruction of assets and resources. The human factor could represent an element of delay...
November 08, 2012 Added by:Scot Terban
Everyone just stop. All you offering the services or touting the ideas should just sit back down and shut up. Everyone cries now that the government is encroaching on their rights with regard to privacy and you all want to just push that bar even further out with offensive defense actions? Morons…
October 16, 2012 Added by:Rafal Los
Attribution is necessary for secondary action, but not always for defense. Secondary action being retaliation, accountability, prosecution, etc. It's more important at the instant of attack to be able to make the attack stop, then afterwards be able to move on and assign blame and make the legal case...
October 04, 2012 Added by:Jim Palazzolo
Is it the legal structure that makes it taboo, or the ambiguity of the target? What are the implications? Could a corporation accidentally set off a cyber flashpoint by attacking targets in other countries? And, is it an organization’s legal right, like an individual, to defend itself?
September 03, 2012 Added by:Joel Harding
The fact is our governments all talk across one another instead of honestly exchanging data. You, me, the engineer in the office down the hall or the President of this country or that, we can all talk about how bad things are but until we have agreed upon terms and can honestly compare apples with oranges, all we are using are empty words
August 28, 2012 Added by:Joel Harding
So what is cyberwar? Most people feel that some country is going to launch attacks against another, trying to blind their military, mute the government and make life incredibly miserable for their citizens. If the attack is successful, part of the economic base will probably be permanently destroyed...
August 18, 2012 Added by:Pierluigi Paganini
It is expected that in the first phase of an offensive against Iran, Israel will conduct a cyber attack of impressive dimensions with the intent to paralyze the country by knocking out the Internet, all communications and other critical infrastructure. This is the new way to engage in a war...
August 17, 2012 Added by:Joel Harding
"Silverstein claims to have obtained an Israeli briefing document outlining the Jewish state’s war plans against Iran, which, according to him, include the launching of dozens of missiles, an aerial attack, a sophisticated cyber attack and even the assassination of senior Iranian military and intelligence officials..."
July 16, 2012 Added by:Pierluigi Paganini
We have witnessed the recruitment of hackers on the part of governments to carry out offensive actions and to train personnel in the use of deadly new weapon... the keyboard. Not with bullets, but with bits we must now battle, and who better than a hacker can transfer their knowledge on the subject matter?
June 25, 2012 Added by:Pierluigi Paganini
The discovery of new cyber weapons will be published with increasing frequency, the real question to ask is if the world is really prepared to respond to these attacks. The stakes are high, security is critical for every nation, and the whole world must be analyzed as a monolithic system...
June 19, 2012 Added by:Gregory Hale
The Indian government authorized two agencies to carry out state-sponsored attacks if necessary. The Indian National Security Council is currently finalizing plans that would give the Defense Intelligence Agency and National Technical Research Organization the power to carry out unspecified offensive operations...
June 12, 2012 Added by:Headlines
“Although cyberspace presents some very unique characteristics, this transitional model is designed to continue DoD’s efforts at normalizing cyber as an integrated function with other land, maritime, air and space functions,” DoD spokesperson Lt. Col. April Cunningham said...
May 23, 2012 Added by:PCI Guru
In a true war, we would be investing in creating an offensive capability to go into cyber-battle with the enemy. And while there are discussions about having offensive capabilities, security professionals are still in a defensive posture protecting the organization...
May 21, 2012 Added by:Pierluigi Paganini
"We continue to see China expressing interest in making investments to improve their capacity for operations in cyberspace, and that is something that we pay very, very careful attention to. There is the potential for these types of operations to be very disruptive..."
May 03, 2012 Added by:Rafal Los
In this post I discuss some of the ramifications of digital weapons and put into context just what this means for your enterprise security strategy as your organization continues towards cloud/utility computing, mobility, and a larger presence on the Internet...
May 02, 2012 Added by:Headlines
“If this represents the official line of thinking, this means that the prospects are not good that a limited conflict in a Taiwan Straits would remain localized to that geography without escalating into an all-out war,” said Chinese cyber warfare expert Dmitri Alperovitch...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013