Blog Posts Tagged with "Cyber Defense"

7fef78c47060974e0b8392e305f0daf0

China’s Cyberwarfare Capabilities are Rudimentary???

November 07, 2011 Added by:Infosec Island Admin

Patching, and secure coding have not been at the fore here and thus it is trivial for the most part to hack into systems throughout the internet. So, the Chinese need not be uber haxx0rs to do the damage needed because we collectively have done a bad job at securing our own networks...

Comments  (1)

1f2f664e68a603b3c54890fbbcd37857

UK Security Strategy

November 02, 2011 Added by:Mark Gardner

I know things change at a rapid pace in It and Security but, as a Security Professional and a UK taxpayer, why the constant writing of strategies. Surely the best defense for the UK is to actually not give the details of what the government is proposing to do?

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Reducing America’s Cyberwar Capabilities to a Maginot Line

October 13, 2011 Added by:Dan Dieterle

The United States has been ravished electronically by infiltrating sources that have pilfered military secrets, financial information and account credentials. According to some, our national infrastructure has also been infiltrated and key systems backdoored...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Navy Developing Cyber Battle Lab in Florida

October 11, 2011 Added by:Headlines

"The next war could be one where not a single bomb is dropped. Why would they if another country could take down our financial system, or shut down commercial aviation for two weeks? The scary part is there are folks who spend all day trying to do just that..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

NSA Conference Focused on Trusted Computing

October 10, 2011 Added by:Headlines

"Generally speaking, trusted computing technologies ensure that hardware and software behave as designed. These solutions prevent malicious computer attacks by combining commercially available, off-the-shelf IT tools. The bad guys are forced to break a sweat, and they still lose..."

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Two Million Euro for Dutch Cyber Operations in 2012

September 27, 2011 Added by:Don Eijndhoven

A small sum, but considerable in the face of ongoing budget cuts at the Dutch Ministry of Defense. One has to wonder though, with all that has been going on the last few years, what will be done with a mere € 2 million for an entire year. This would pay for roughly 10 people and some hardware...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Israel and Cyber Warfare

September 27, 2011 Added by:Stefano Mele

The book discusses the formulation and development of Israeli deterrence policies, including the ability to carry out injurious and direct response against any party engaged in aggression against Israeli cyberspace...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

It’s War! It’s a Cyberwar!

September 24, 2011 Added by:Joel Harding

Mitsubishi Heavy Industries in Japan is under attack. Why is this not a cyberwar? Besides the obvious legal definitions where this doesn’t even remotely resemble a war - no declaration of war nor is there an ‘act of war’ as in the US Code - and there is certainly no death and destruction...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

NATO to Lead Multinational Cyber Defense Effort

September 23, 2011 Added by:Headlines

“In the spirit of the Secretary General’s call for 'smart defense' through multinational efforts, the aim is to lower the cost of and facilitate national capability development. In the interconnected world of cyber space, we are only as strong as the weakest link...”

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Future Enterprise: Cyber Warfare

September 23, 2011 Added by:Bill Gerneglia

Cyber war is now an urgent issue that transcends lines between enterprises or governments. Unless a global cyber security framework can be engineered, a world of disorder will rapidly emerge - a turbulent world, where change has ceased to be beneficial and becomes ultimately destructive...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

NATO Seeks Cyber Alliance with India

September 16, 2011 Added by:Headlines

Chinese state backed hackers are not the only threat we are facing. The Russian Business Network and other foreign government-backed entities are falling from the radar as Chinese hackers take center stage. Lets not forget the lone hackers or hacktivist groups that are very active...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Iran Prepares for Cyberwar

September 11, 2011 Added by:Joel Harding

Last year a website I was running on information warfare was hacked. Rather, I should say, it was defaced. Someone got onto the website and exchanged my main HTML page with theirs. It was the Iranian Cyber Army, they left their calling card along with some funky looking furling flag...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

UK Investing Heavily in Cyber Offensive Capabilities

September 07, 2011 Added by:Headlines

"Suppose you're a scientist at Cheltenham and you come up with a new exploit of Windows. Are you going to tell Microsoft, get it patched and protect 60 million Brits? Or are you going to keep quiet about it so you can exploit 1.2 billion Chinese and 1 billion Indians?"

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Cyberspace and 4th Generation Warfare - A Marriage of Convenience

August 25, 2011 Added by:Don Eijndhoven

The lesson here is that we should prepare our online critical infrastructure for attacks ahead of time. Assume that attacks will come and that attacks will be successful. This means that critical services should be redundant and capable of providing service even while under attack...

Comments  (10)

7fef78c47060974e0b8392e305f0daf0

America Faced With Wave of Chinese Espionage

July 18, 2011 Added by:Infosec Island Admin

Espionage by the Chinese has been a favorite past time for them with regard to the U.S. and now that espionage is taking place within computer networks. But this too has been happening for a long time (see Titan Rain or others like Moonlight Maze)...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)

Page « < 3 - 4 - 5 - 6 - 7 > »