Blog Posts Tagged with "Cyber Security"

94ae16c30d35ee7345f3235dfb11113c

The Cyber Money Train

October 15, 2012 Added by:Joel Harding

Anything to do with Cyber equates to a lot of money. One estimate for CY 2012 was $13 Billion being budgeted for cybersecurity just for the US government. One study I read predicted we would need to increase spending by up to 1,800 percent. That, ladies and gentlemen, is a big chunk of change...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Secretary of Defense Panetta on U.S. Cyber Capabilities

October 15, 2012 Added by:Pierluigi Paganini

Panetta has warned of cyber attacks against critical infrastructure and that opponents are increasing their cyber capabilities and represent a serious menace. The words used last Thursday are very strong: The US is in a “pre-9/11 moment,” referring to a possible series of cyber attacks...

Comments  (4)

94ae16c30d35ee7345f3235dfb11113c

The Derecho Named Cyber

October 10, 2012 Added by:Joel Harding

The discussions we had back in the mid-90s are still ongoing, we still don’t have a proper information sharing cybersecurity bill and people still don’t trust the government to maintain their privacy. Please, members of congress and business leaders, work on cybersecurity as if our lives depend on it...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

I’m Mad as Hell about an Executive Order on Cybersecurity

October 07, 2012 Added by:Joel Harding

And as much as you might not care, if President Obama signs an Executive Order on cybersecurity, it will set the de facto standards that we all must live with. You’ll share the data and you’ll have to live with the standards...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cyber War: Fact from Fiction in the shadow of the Tallinn Manual

October 04, 2012 Added by:Rafal Los

Are we involved in open cyber warfare? Definitely not. We are definitely involved in a Cold War style set of guerilla incursions aimed at strategic assets for espionage or financial damage. This hasn't yet moved direct confrontation - but that may simply be a matter of time...

Comments  (3)

70830de61015ee5312d58e6a9e0254ae

Is a Communist or Totalitarian System Preferable in the Internet Age?

October 03, 2012 Added by:Doug DePeppe

In the West, we tout the openness of the Internet. Many attribute the Internet as playing a major part in the Arab Spring. The dark underbelly of the Internet, however, is that all this connectivity allows bad actors to connect to any target he desires...

Comments  (4)

70830de61015ee5312d58e6a9e0254ae

We're Under Cyber Attack INSIDE America!

October 01, 2012 Added by:Doug DePeppe

Cyberattacks are mounting. They are getting more severe, and indicate nation-state support, reportedly from Iran. The US national strategy must change. It must address the need for capability where harm from an attack on critical infrastructure will be felt in communities across America...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

PlaceRaider: 3D Visual Malware from Military Research

October 01, 2012 Added by:Pierluigi Paganini

It's known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. We have already read about the existence of software to spy on victims that are able to record communications and movements but the Naval Surface Warfare Center in Crane, Indiana in collaboration with researchers at Indiana University created a new type of 'vi...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

On the Lack of IT Readiness: The Security Edition

September 30, 2012 Added by:Rafal Los

Sticking to the basics wouldn't be such a bad thing in Security... if we had a clue on how to do the basics right. I know plenty of people who pentest all day every day and they'll be the first to tell you how easy it is to break in because defenses are so weak, if they exist at all...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The Wicked Witches of Cyberspace

September 27, 2012 Added by:Joel Harding

Lately I’ve been doing a deep dive on technologies that enable one to bypass filters, blocking and jamming, to get uncensored information into denied areas. When we use these technologies it is on behalf of goodness, apple pie and the American way. When someone else does its nefarious...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iran Increasing Tensions: Cyber Perspective

September 24, 2012 Added by:Pierluigi Paganini

A massive cyber attack could increase hostilities, anticipating a conventional strike, but the Government of Teheran is showing awareness of risks related to a cyber attack and it has started a massive propaganda campaign to show to the western world its cyber capabilities...

Comments  (4)

924ce315203c17e05d9e04b59648a942

An Open Letter to Senator Rockefeller

September 20, 2012 Added by:Richard Stiennon

Like in many matters involving science and technology, scientists and technologists should be brought into future deliberations on cyber legislation. The technologists that make the Internet operate and the security experts that battle to defend it need to be brought to the table...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

SOURCESeattle Write-Up

September 18, 2012 Added by:Robert M. Lee

As my perspective in infosec comes from my role as a Cyberspace Operations Officer in the Air Force, where most people say “infosec” I say “cyber” and try to speak on the broader domain impacts, deterrence, sharing threat intelligence, education, and the importance of working together...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

War in Cyberspace is about Definitions

September 18, 2012 Added by:Joel Harding

We are stuck in “Definitional Wars” or the struggle to get definitions approved that are not only accurate but widely accepted. A bigger problem is the constant evolution of technology and terminology, by the time a definition is published, it is usually obsolete...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

State-Sponsored Attacks or Not? That's the Question...

September 18, 2012 Added by:Pierluigi Paganini

Despite the use of cyber weapons and the damage caused by offensive operations being major concerns for intelligence agencies, clues are frequently discovered about attacks designed to steal sensitive information and intellectual property. Who is behind these cyber attacks?

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Important SCADA Security Tips

September 16, 2012 Added by:Brent Huston

Utilities have been computerizing their SCADA systems for years now. This has allowed them to save money, time and manpower and has increased their situational awareness and control flexibility. However, industrial control systems are usually not very robust and also very ‘dumb...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »