Blog Posts Tagged with "Cyber Defense"


From Production Slumps to Industrial Espionage: Why the Manufacturing Sector Must Be Better Prepared for Cyber Attacks

July 12, 2016 Added by:Mirko Brandner

In a connected world, where digitization progresses rapidly and finds its way into our factories, we are inevitably faced with an ever-increasing level of vulnerabilities that lead to security breaches.

Comments  (0)


Collective Self-defense: What Japan’s New Defense Policy Means for International Cooperation on Cyber Security

September 04, 2014 Added by:Mihoko Matsubara

Joint exercises are key to making joint operations seamless and increasing the capability of cyber defenses. The Japanese and US governments have committed themselves to revise the US–Japan Defense Cooperation Guidelines by the end of this year and to include bilateral cooperation on cyber security in the revision.

Comments  (0)


The Chilling State of Cyber Affairs (US DoD Report)

June 28, 2013 Added by:Don Eijndhoven

With all the attention pointed towards PRISM, another interesting publication was virtually overlooked. Earlier last month, a taskforce belonging to the US DoD's Defense Science Board (DSB) released a final report titled "Resilient Military Systems and the Advanced Cyber Threat" [PDF], that reports on the findings of an 18-month research project.

Comments  (0)


2013 - Year of the D(efense)

December 26, 2012 Added by:Matthew McWhirt

Many of the security incidents encompassing 2012 could have been mitigated, and some even fully prevented, if fundamental information security best practices had been reviewed and assessed, and controls encompassing incident response phases had been fully vetted...

Comments  (0)


Israel’s Cyber Defenses Protect Government Sites from 44 Million Attacks

December 11, 2012 Added by:Dan Dieterle

Israel’s cyber defense is hard at work blocking millions of incoming cyber attacks. There have been millions of hacking attempts against government sites that have been intercepted with reportedly only one successfully taking down it’s target. And that for only a few minutes...

Comments  (0)


Who Needs Words for Wars?

December 09, 2012 Added by:Jayson Wylie

This article holds little validity in my mind and I’m sure that runs up the chain of the Government to President Obama who is the only one, at this time, that seems to be able to have a majority consensus for a direction or secret directives for Cyberspace activities, rules and laws...

Comments  (0)


Proactive defense, humans or machines… that’s the question

November 27, 2012 Added by:Pierluigi Paganini

Cyber conflicts are characterized by the necessity of an immediate cyber response to the incoming cyber threats, in many cases the reaction must be instantaneous to avoid the destruction of assets and resources. The human factor could represent an element of delay...

Comments  (0)


Defending Your Digital Domain Redux: Take 2

November 21, 2012 Added by:Rafal Los

I'll start with I'm not an expert on 'cyber warfare' or a lawyer offering legal advice, in fact I'd simply rather not touch that whole angle at all. I'm much more comfortable addressing this issue as it came up today from a more sensible perspective. What follows in this post is an editorial opinion...

Comments  (0)


The Best Cybersecurity Strategy May be Counter-Terror

September 03, 2012 Added by:Danny Lieberman

The problem with a defensive cyber-security strategy is that it does not address the root cause of threats.

Comments  (0)


The Right to Keep and Bear Cyber Arms

August 29, 2012 Added by:Dan Dieterle

With all the media hype over Stuxnet, cyber war and cyber weapons – should US citizens be legally allowed to own and use these weapons in accordance with their 2nd Amendment rights? Why shouldn’t Americans be allowed to actively defend themselves against online electronic risks as well as physical threats?

Comments  (10)


DOD: Key to Cyber Defense is Highly Skilled People

July 31, 2012 Added by:Headlines

Cyber war is complicated and defending systems demands world-class engineers and technicians and the military must compete with other public agencies and the private sector in attracting these specialists. Having the right people in the right places with the right training is the best defense against any attack...

Comments  (1)


NATO Offers Cyber Defense Awareness Online Course

July 23, 2012 Added by:Infosec Island Admin

The NATO Cooperative Cyber Defence Centre of Excellence has developed an online Cyber Defence Awareness course that aims to enhance the general user’s awareness of cyber security risks and measures to mitigate those risks. The course may be accessed through the NATO Joint Advanced Distributed Learning portal...

Comments  (0)


English Translation of the Dutch Defense Cyber Strategy

July 18, 2012 Added by:Matthijs R. Koot

The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...

Comments  (0)


So You Want to Hire a Hacker?

July 17, 2012 Added by:Ali-Reza Anghaie

The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...

Comments  (0)


NSA Chief: Cyber Presents Opportunities and Challenges

July 11, 2012 Added by:Headlines

“If the critical infrastructure community is being attacked by something, we need them to tell us at network speed... It requires them - the Internet service provider or that company - to tell us that that type of event is going on at this time. And it has to be at network speed if you’re going to stop it...”

Comments  (0)


Dutch MoD Releases Defense Cyber Strategy

June 29, 2012 Added by:Don Eijndhoven

What makes this interesting is that they are declaring that non-combatants may also be actively targeted. In essence, they are putting the world on notice that if you’re involved with a cyber attack, part of a militia or a terrorist, you have a bull’s-eye on your head. No matter where you are. Plain and simple...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked