Blog Posts Tagged with "cyberspace"

94ae16c30d35ee7345f3235dfb11113c

How We Might Wage War in Cyberspace

September 19, 2012 Added by:Joel Harding

With the way US forces are distributed globally, cyber capabilities and flexibilities are enhanced. Cyber, both offense and defense, can be launched from anywhere. All Combatant Commanders have liaisons and representative elements with geographic commands, Cyber Command is no different...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Cyber: Boundless Nonsense

July 31, 2012 Added by:Don Eijndhoven

What is neutral behavior in the context of cyber warfare? Are you, as a neutral country obliged to drop all traffic between these two waring nations that crosses your networks? And if you’re not, are you obliged to make sure none of the cyber attacks are originating from compromised systems within your borders?

Comments  (8)

69dafe8b58066478aea48f3d0f384820

Officials Examine the Militarization of Cyberspace

April 16, 2012 Added by:Headlines

"If there is significant information of a cyber-event, we reserve the right to use tools in our toolbox,. When does a cyber-attack achieve critical level? When one can attribute an attack that deliberately causes loss of life," a U.S. official stated...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Seeks Proposals to Improve Trust in Cyberspace

February 10, 2012 Added by:Headlines

The National Institute of Standards and Technology (NIST) launched a competition for pilot projects to accelerate progress toward improved systems for interoperable, trusted online credentials that go beyond simple user IDs and passwords...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Workshop to Support Trusted IDs in Cyberspace

January 27, 2012 Added by:Headlines

The workshop will focus on how technologies and standards can help the framework of the Identity Ecosystem coalesce. As envisioned by the NSTIC, the Identity Ecosystem is a user-centric online environment—a set of technologies, policies and agreed upon standards...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress Sanctions Offensive Military Action in Cyberspace

December 15, 2011 Added by:Headlines

Section 954 of the the FY 2012 defense authorization act states that “Congress affirms that the Department of Defense has the capability, and upon direction by the President may conduct offensive operations in cyberspace to defend our Nation, allies and interests..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Department of Defense Cyberspace Policy Report

November 18, 2011 Added by:Headlines

"While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation..."

Comments  (0)