Blog Posts Tagged with "Cyber Offense"

03b2ceb73723f8b53cd533e4fba898ee

Proactive defense, humans or machines… that’s the question

November 27, 2012 Added by:Pierluigi Paganini

Cyber conflicts are characterized by the necessity of an immediate cyber response to the incoming cyber threats, in many cases the reaction must be instantaneous to avoid the destruction of assets and resources. The human factor could represent an element of delay...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Offensive Defense: A Really Bad Idea Proposed By Charlatans And Zealots

November 08, 2012 Added by:Infosec Island Admin

Everyone just stop. All you offering the services or touting the ideas should just sit back down and shut up. Everyone cries now that the government is encroaching on their rights with regard to privacy and you all want to just push that bar even further out with offensive defense actions? Morons…

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Difficulties with Attribution in a Digital World

October 16, 2012 Added by:Rafal Los

Attribution is necessary for secondary action, but not always for defense. Secondary action being retaliation, accountability, prosecution, etc. It's more important at the instant of attack to be able to make the attack stop, then afterwards be able to move on and assign blame and make the legal case...

Comments  (0)

888605c6c25c19e41bbbb986ea6d43c1

Another HAck-bAck Blog

October 04, 2012 Added by:Jim Palazzolo

Is it the legal structure that makes it taboo, or the ambiguity of the target? What are the implications? Could a corporation accidentally set off a cyber flashpoint by attacking targets in other countries? And, is it an organization’s legal right, like an individual, to defend itself?

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Our Cyber Dysconnect

September 03, 2012 Added by:Joel Harding

The fact is our governments all talk across one another instead of honestly exchanging data. You, me, the engineer in the office down the hall or the President of this country or that, we can all talk about how bad things are but until we have agreed upon terms and can honestly compare apples with oranges, all we are using are empty words

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyberwar! Let’s Work Through This, Shall We...

August 28, 2012 Added by:Joel Harding

So what is cyberwar? Most people feel that some country is going to launch attacks against another, trying to blind their military, mute the government and make life incredibly miserable for their citizens. If the attack is successful, part of the economic base will probably be permanently destroyed...

Comments  (5)

03b2ceb73723f8b53cd533e4fba898ee

How Will Israel Attack Iran?

August 18, 2012 Added by:Pierluigi Paganini

It is expected that in the first phase of an offensive against Iran, Israel will conduct a cyber attack of impressive dimensions with the intent to paralyze the country by knocking out the Internet, all communications and other critical infrastructure. This is the new way to engage in a war...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Israeli Operations Against Iran Will Begin with Cyber Attack

August 17, 2012 Added by:Joel Harding

"Silverstein claims to have obtained an Israeli briefing document outlining the Jewish state’s war plans against Iran, which, according to him, include the launching of dozens of missiles, an aerial attack, a sophisticated cyber attack and even the assassination of senior Iranian military and intelligence officials..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On Government Strategies to Mitigate Growing Cyber Threats

July 16, 2012 Added by:Pierluigi Paganini

We have witnessed the recruitment of hackers on the part of governments to carry out offensive actions and to train personnel in the use of deadly new weapon... the keyboard. Not with bullets, but with bits we must now battle, and who better than a hacker can transfer their knowledge on the subject matter?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyber War: The Strategic Importance of Defense

June 25, 2012 Added by:Pierluigi Paganini

The discovery of new cyber weapons will be published with increasing frequency, the real question to ask is if the world is really prepared to respond to these attacks. The stakes are high, security is critical for every nation, and the whole world must be analyzed as a monolithic system...

Comments  (0)

2dc39ef06d1ad53bea80d28b84f3aa7e

India on Stuxnet Alert

June 19, 2012 Added by:Gregory Hale

The Indian government authorized two agencies to carry out state-sponsored attacks if necessary. The Indian National Security Council is currently finalizing plans that would give the Defense Intelligence Agency and National Technical Research Organization the power to carry out unspecified offensive operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon to Regionalize Cyber Response Capabilities

June 12, 2012 Added by:Headlines

“Although cyberspace presents some very unique characteristics, this transitional model is designed to continue DoD’s efforts at normalizing cyber as an integrated function with other land, maritime, air and space functions,” DoD spokesperson Lt. Col. April Cunningham said...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Is Security Broken? How I Propose to Fix It...

May 23, 2012 Added by:PCI Guru

In a true war, we would be investing in creating an offensive capability to go into cyber-battle with the enemy. And while there are discussions about having offensive capabilities, security professionals are still in a defensive posture protecting the organization...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

US vs. China: Is the Cyber Warfare Gap Increasing?

May 21, 2012 Added by:Pierluigi Paganini

"We continue to see China expressing interest in making investments to improve their capacity for operations in cyberspace, and that is something that we pay very, very careful attention to. There is the potential for these types of operations to be very disruptive..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cyber Weapons - Bits Instead of Bullets Damage Nonetheless

May 03, 2012 Added by:Rafal Los

In this post I discuss some of the ramifications of digital weapons and put into context just what this means for your enterprise security strategy as your organization continues towards cloud/utility computing, mobility, and a larger presence on the Internet...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Military Advocates Cyber Offensive Capability

May 02, 2012 Added by:Headlines

“If this represents the official line of thinking, this means that the prospects are not good that a limited conflict in a Taiwan Straits would remain localized to that geography without escalating into an all-out war,” said Chinese cyber warfare expert Dmitri Alperovitch...

Comments  (0)

Page « < 1 - 2 - 3 > »