Blog Posts Tagged with "Cyber Defense"
October 10, 2011 Added by:Headlines
"Generally speaking, trusted computing technologies ensure that hardware and software behave as designed. These solutions prevent malicious computer attacks by combining commercially available, off-the-shelf IT tools. The bad guys are forced to break a sweat, and they still lose..."
September 27, 2011 Added by:Don Eijndhoven
A small sum, but considerable in the face of ongoing budget cuts at the Dutch Ministry of Defense. One has to wonder though, with all that has been going on the last few years, what will be done with a mere € 2 million for an entire year. This would pay for roughly 10 people and some hardware...
September 24, 2011 Added by:Joel Harding
Mitsubishi Heavy Industries in Japan is under attack. Why is this not a cyberwar? Besides the obvious legal definitions where this doesn’t even remotely resemble a war - no declaration of war nor is there an ‘act of war’ as in the US Code - and there is certainly no death and destruction...
September 23, 2011 Added by:Headlines
“In the spirit of the Secretary General’s call for 'smart defense' through multinational efforts, the aim is to lower the cost of and facilitate national capability development. In the interconnected world of cyber space, we are only as strong as the weakest link...”
September 23, 2011 Added by:Bill Gerneglia
Cyber war is now an urgent issue that transcends lines between enterprises or governments. Unless a global cyber security framework can be engineered, a world of disorder will rapidly emerge - a turbulent world, where change has ceased to be beneficial and becomes ultimately destructive...
September 16, 2011 Added by:Headlines
Chinese state backed hackers are not the only threat we are facing. The Russian Business Network and other foreign government-backed entities are falling from the radar as Chinese hackers take center stage. Lets not forget the lone hackers or hacktivist groups that are very active...
September 11, 2011 Added by:Joel Harding
Last year a website I was running on information warfare was hacked. Rather, I should say, it was defaced. Someone got onto the website and exchanged my main HTML page with theirs. It was the Iranian Cyber Army, they left their calling card along with some funky looking furling flag...
September 07, 2011 Added by:Headlines
"Suppose you're a scientist at Cheltenham and you come up with a new exploit of Windows. Are you going to tell Microsoft, get it patched and protect 60 million Brits? Or are you going to keep quiet about it so you can exploit 1.2 billion Chinese and 1 billion Indians?"
August 25, 2011 Added by:Don Eijndhoven
The lesson here is that we should prepare our online critical infrastructure for attacks ahead of time. Assume that attacks will come and that attacks will be successful. This means that critical services should be redundant and capable of providing service even while under attack...
July 18, 2011 Added by:Scot Terban
Espionage by the Chinese has been a favorite past time for them with regard to the U.S. and now that espionage is taking place within computer networks. But this too has been happening for a long time (see Titan Rain or others like Moonlight Maze)...
July 15, 2011 Added by:Headlines
"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."
July 06, 2011 Added by:Headlines
"This may have been a test of South Korea’s preparedness to mitigate cyberattacks, possibly by North Korea or their sympathizers... the attack itself was very limited and may have been utilized to test and observe how quickly the attack would be discovered, reverse engineered, and mitigated..."
June 14, 2011 Added by:Headlines
“The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems. It is going to take both defensive measures as well as aggressive measures to deal with it..."
June 01, 2011 Added by:Headlines
“We must plan, train, exercise and operate in a way which integrates our activities in both cyber and physical space. We will grow a cadre of dedicated cyber experts to support our own and allied cyber operations and secure our vital networks...”
May 27, 2011 Added by:Headlines
Cyber attacks offer vastly favorable cost-benefit ratios in comparison to conventional military options. It is increasingly probable that a cyber attack on a NATO country will precede, or even replace a physical assault, moving cyber issues to the forefront of security concerns...
NSA Surveillance Is Legal And Not Targeting ... John Smith on 06-13-2013
Vulnerability Management and Root Cause Anal... Ian Tibble on 06-12-2013
Vulnerability Management and Root Cause Anal... Koen Van Impe on 06-11-2013