Blog Posts Tagged with "Defense"


Deceptioneering: Exploring How Humans Are Wired for Deception

September 23, 2017 Added by:Perry Carpenter

No matter how much security technology we purchase, we still face a fundamental security problem: people. They are both our biggest threat and they serve as our last line of defense.

Comments  (0)


Three Keys to Managing Firewalls for Better Security

September 25, 2012 Added by:Richard Stiennon

The that firewalls do not provide value had its first incarnation in de-perimeterization. The idea is that because network security is so hard we should give up and focus on securing the endpoints and data that travels between them. In reality we have to defend four separate domains...

Comments  (1)


On NATO and Cyber Warfare

June 20, 2012 Added by:gaToMaLo r. amores

"Threats are rapidly evolving both in frequency and sophistication. Threats emanating from cyberspace – whether from states, hacktivists or criminal organizations, among many others – pose a considerable challenge to the Alliance and must be dealt with as a matter of urgency"...

Comments  (0)


Securing the Virtual Environment: How to Defend Against Attack

June 06, 2012 Added by:Ben Rothke

One of the selling points around virtualization is its perceived added level of security. But virtualization, like any other piece of software can be implemented incorrectly, and itself have flaws. To secure virtualization effectively, one needs to understand how adversaries will attack an environment...

Comments  (0)


Memorial Day – A Big Thank You

May 27, 2012 Added by:Thomas Fox

Today is Memorial Day, the day we celebrate the men and women who have served our country in our armed forces. I would ask each of you to honor our veterans, even if it is just a moment to reflect on those who made the ultimate sacrifice in giving their lives to protect the rest of us...

Comments  (0)


Notes on Electromagnetic Pulse (EMP) in US, UK, NL

May 22, 2012 Added by:Matthijs R. Koot

In 2009, there was a discussion on a forum for pilots about an article that argued that a commercial aircraft could be brought down by DIY EMP bombs. Also in 2009, the U.S. Patent Application for an Electromagnetic pulse (EMP) hardened information infrastructure was filed...

Comments  (1)


Dutch Military Intelligence Dives into Cyber

May 21, 2012 Added by:Don Eijndhoven

One of the most interesting facts extracted from the report is that the MIVD will focus the majority of its cyber warfare efforts in countering espionage. Given that this is probably the most tangible and widely represented cyber activity currently employed, this is a wise choice...

Comments  (0)


Air Force Vice Commander: Everyone is Focused on Cyber

April 20, 2012 Added by:Headlines

"The enemy will be inside our networks for malice, curiosity, or just for the challenge. We must prioritize our defense efforts with a mission assurance approach... Cyberspace is a part of every war fight, every mission that we're in. Everyone is focused on cyber...."

Comments  (0)


DoD to Expand International Cybersecurity Cooperation

April 16, 2012 Added by:Headlines

“I think it’s very important to do as much as we can to prevent and mitigate the threat at home, but we can only get so far acting unilaterally. We have to act in concert… with countries around the world to address this problem...”

Comments  (1)


Projectile Dysfunction

April 13, 2012 Added by:Ron Baklarz

Was it me or when they showed the North Korean Space Control Center did it not look like a group of students at a code fest? Seriously, there were no large screens for tracking and I’ve seen more computing power at the local senior citizens home...

Comments  (2)


DoD Comments on Cyberwar and the Law of Armed Conflict

April 13, 2012 Added by:Headlines

“We’re trying to think about cyber operations as a new form of policy tool that gives the president or the secretary of defense new options. We’re not actively looking to mount operations in cyberspace... We want to do it only when appropriate and when there’s a good reason to.."

Comments  (1)


Army's First Dedicated Cyber Brigade Now Operational

March 19, 2012 Added by:Headlines

"It’s a very complex threat—pervasive, evolving, highly intelligent, very adaptive to our countermeasures. It ranges from nation-states to non-nation-state actors, criminal elements and individual hackers... It’s a wide and varied threat we have to defend against..."

Comments  (0)


US Strategic Command on Defending Cyberspace

February 07, 2012 Added by:Headlines

DoD networks and personnel are being tested to the very limits of their ability to deflect assault. Attackers all over the world are utilizing every conceivable method to gain access to our critical systems and introduce malicious code to exploit or destroy our assets...

Comments  (0)


Intelligence Leaders Urge Congress to Act on Cyber Laws

February 06, 2012 Added by:Headlines

Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...

Comments  (0)


Evidence of Chinese Attacks on US Defense Contractors

January 30, 2012 Added by:Plagiarist Paganini

At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...

Comments  (0)


Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »