Blog Posts Tagged with "Defense"
September 25, 2012 Added by:Richard Stiennon
The that firewalls do not provide value had its first incarnation in de-perimeterization. The idea is that because network security is so hard we should give up and focus on securing the endpoints and data that travels between them. In reality we have to defend four separate domains...
June 20, 2012 Added by:gaToMaLo r. amores
"Threats are rapidly evolving both in frequency and sophistication. Threats emanating from cyberspace – whether from states, hacktivists or criminal organizations, among many others – pose a considerable challenge to the Alliance and must be dealt with as a matter of urgency"...
June 06, 2012 Added by:Ben Rothke
One of the selling points around virtualization is its perceived added level of security. But virtualization, like any other piece of software can be implemented incorrectly, and itself have flaws. To secure virtualization effectively, one needs to understand how adversaries will attack an environment...
May 27, 2012 Added by:Thomas Fox
Today is Memorial Day, the day we celebrate the men and women who have served our country in our armed forces. I would ask each of you to honor our veterans, even if it is just a moment to reflect on those who made the ultimate sacrifice in giving their lives to protect the rest of us...
May 22, 2012 Added by:Matthijs R. Koot
In 2009, there was a discussion on a forum for pilots about an article that argued that a commercial aircraft could be brought down by DIY EMP bombs. Also in 2009, the U.S. Patent Application for an Electromagnetic pulse (EMP) hardened information infrastructure was filed...
May 21, 2012 Added by:Don Eijndhoven
One of the most interesting facts extracted from the report is that the MIVD will focus the majority of its cyber warfare efforts in countering espionage. Given that this is probably the most tangible and widely represented cyber activity currently employed, this is a wise choice...
April 20, 2012 Added by:Headlines
"The enemy will be inside our networks for malice, curiosity, or just for the challenge. We must prioritize our defense efforts with a mission assurance approach... Cyberspace is a part of every war fight, every mission that we're in. Everyone is focused on cyber...."
April 16, 2012 Added by:Headlines
“I think it’s very important to do as much as we can to prevent and mitigate the threat at home, but we can only get so far acting unilaterally. We have to act in concert… with countries around the world to address this problem...”
April 13, 2012 Added by:Ron Baklarz
Was it me or when they showed the North Korean Space Control Center did it not look like a group of students at a code fest? Seriously, there were no large screens for tracking and I’ve seen more computing power at the local senior citizens home...
April 13, 2012 Added by:Headlines
“We’re trying to think about cyber operations as a new form of policy tool that gives the president or the secretary of defense new options. We’re not actively looking to mount operations in cyberspace... We want to do it only when appropriate and when there’s a good reason to.."
March 19, 2012 Added by:Headlines
"It’s a very complex threat—pervasive, evolving, highly intelligent, very adaptive to our countermeasures. It ranges from nation-states to non-nation-state actors, criminal elements and individual hackers... It’s a wide and varied threat we have to defend against..."
February 07, 2012 Added by:Headlines
DoD networks and personnel are being tested to the very limits of their ability to deflect assault. Attackers all over the world are utilizing every conceivable method to gain access to our critical systems and introduce malicious code to exploit or destroy our assets...
February 06, 2012 Added by:Headlines
Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...
January 30, 2012 Added by:Pierluigi Paganini
At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...
January 27, 2012 Added by:Headlines
The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...
January 22, 2012 Added by:Matthijs R. Koot
In December 2011 the Dutch Advisory Council on International Affairs published an advisory entitled "Digitale Oorlogsvoering" (English: "Digital Warfare") intended for the Dutch government. Below is my translation of the conclusions and recommendations of the advisory...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013