Blog Posts Tagged with "DoD"
November 18, 2011 Added by:Headlines
"While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation..."
November 17, 2011 Added by:Scot Terban
It’s pretty damned hard to determine who did what and where on the net. Digital forensics only gets you so far - compromised machines can be tampered with in so many ways to make it look like someone did something, and these guys want to launch cruise missiles against nation states over a DDoS?
November 16, 2011 Added by:Headlines
"When warranted, we will respond to hostile attacks in cyberspace as we would to any other threat to our country. We reserve the right to use all necessary means - diplomatic, informational, military and economic - to defend our nation, our allies, our partners and our interests..."
November 07, 2011 Added by:Headlines
"We are shifting our investments to activities that promise more convergence with the threat and that recognize the needs of the DoD. Malicious cyber attacks are not merely an existential threat to our bits and bytes. They are a real threat to our physical systems..."
October 31, 2011 Added by:Brian Dean
It is recommended that organizations receiving PII become intimately familiar with all of the applicable security requirements for their industry in order to understand minimum protection requirements, industry best practices, as well as the consequences of noncompliance...
September 19, 2011 Added by:Joel Harding
There are literally tons of websites out there dealing with information warfare, information operations, psychological warfare, military information support operations and a myriad of topics. This website is not bad, not bad at all, it’s just not good....
September 08, 2011 Added by:John Linkous
Many asked why, given that Agencies had the latest incident and event management technologies, the breach had not at least been spotted sooner - even if they were unable to prevent it completely. What followed is a response unlike any I've seen to date in the commercial sector...
August 22, 2011 Added by:Headlines
"The Defense Advanced Research Projects Agency (DARPA) is requesting information on innovative technologies and approaches to secure the Nation’s infrastructure and to ensure the survival of the Department of Defense’s cyber capabilities in case of attack..."
August 16, 2011 Added by:Headlines
The plan, "Building a Digital Nation," outlines NICE's mission, vision, goals and objectives. NIST and its interagency NICE partners seek comments from all interested citizens and organizations concerned with cybersecurity awareness, training and education...
July 27, 2011 Added by:Marjorie Morgan
An effort is underway to compel thousands of companies to provide proprietary data under the Defense Production Act (DPA) or face fines and criminal prosecution. While use of the DPA has ample precedent, this seems to go well beyond its intended purposes...
July 27, 2011 Added by:Headlines
According to the U.S. Strategic Command, the DOD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DOD and other U.S. government computer networks to further a variety of ideological objectives...
July 22, 2011 Added by:Headlines
"The continued failure to address and define the policies and legal authorities necessary for the Pentagon to operate in the cyberspace domain remains a significant gap in our national security that must be addressed," wrote Senators Levin and McCain to Defense Secretary Panetta...
July 19, 2011 Added by:Headlines
Callahan was the ex-Clinton staffer who famously lost thousands of White House e-mails which were under subpoena, and was also dismissed by the Department of Homeland Security after a Congressional investigation determined she lied about her education and experience credentials...
July 16, 2011 Added by:Headlines
Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...
July 15, 2011 Added by:Headlines
"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."
July 14, 2011 Added by:Headlines
"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," deputy secretary of defense William Lynn said in a speech at the National Defense University at Fort McNair...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013