Blog Posts Tagged with "National Security"
May 25, 2011 Added by:Headlines
"The reaction by Siemens is the old school knee-jerk reaction: 'Just 'cus some kids can do it does not mean we are targeted'. Industrial control vendors and users have to take this very seriously. They are being targeted, they are vulnerable, and the repercussions could be expensive..."
May 24, 2011 Added by:Headlines
The debate in the U.S. over legislating an "Internet kill switch" is not one of whether or not to create a mechanism to control Internet access, but one of who will legally exercise the power to limit accessibility and under what circumstances...
May 20, 2011 Added by:Headlines
"Overall, the proposals are disappointing compared with what the president said in his 2009 policy statement... [and] when you look at some sections, it appears to give DHS some broad authorities here that concern us." said Larry Clinton, president of the Internet Security Alliance...
May 19, 2011 Added by:Headlines
“Things could explode. I don’t want to overplay this and sound like it’s a bunch of FUD but physical damage can occur and people can be seriously injured or worse. So we felt it was best to be prudent and wait a bit longer until we get more information," said NSS Labs CEO Rick Moy...
May 12, 2011 Added by:Headlines
“We are now in a world in which cyber warfare is very real. It could threaten our grid system. It could threaten our financial system. It could paralyze this country, and I think that's an area we have to pay a lot more attention to..."
May 12, 2011 Added by:J. Oquendo
These environments are very complex. There would need to be years of reconnaissance with heavy financial investments to pull off a successful attack. Any attacker would have to cross their fingers and hope that their target did not upgrade, migrate, or change software...
May 11, 2011 Added by:Robert Siciliano
Critical infrastructures all depend on the electric grid. After a major attack, we’d be back to the dark ages in an instant. No electricity, no computers, no gasoline, no refrigeration, no clean water. Think about what happens when the power goes out for a few hours. We’re stymied...
May 10, 2011 Added by:Don Eijndhoven
The attacks on the Pentagon networks, the plundering of its email servers, the 2007 attacks on Estonia, the 2008 attacks on Georgia and the 2009 attacks on both the US as well as South Korea should sway any sane person from the notion that cyberwar denial will solve the problem...
May 06, 2011 Added by:Ben Rothke
The Internet has revolutionized how we socialize and do business, speeding commerce, facilitating knowledge sharing, and creating networks that could not have existed a decade ago. Unfortunately, terrorists reap the same benefits...
May 05, 2011 Added by:J. Oquendo
In a conventional war, superpowers still have deterrents: nuclear weapons, financial fallout and so on. In a cyberwar, there is nothing more than imagined deterrents because as an attacker, anonymity will reign supreme. Deterrents do not apply on the cyber battlefield...
May 02, 2011 Added by:Headlines
The Chinese have long seen a tactical cyber offensive capability as being a powerful equalizer in their quest to attain superpower status and undermine the effectiveness of international political rivals. The Chinese strategy extends well beyond potential military targets...
April 28, 2011 Added by:Don Eijndhoven
The odds of fending off a large scale cyber conflict are against the Netherlands, but I don´t believe there is any other ´connected´ nation who is faring any better. Luckily many of the earlier initiatives with regards to Critical Infrastructure have been about recovering services...
April 28, 2011 Added by:Headlines
"One agent who had recently been assigned his first counterterrorism intrusion case said that he did not know how to investigate a national security intrusion case. He was concerned about is ability to perform the investigation, especially because he viewed it as a significant case..."
April 20, 2011 Added by:Scot Terban
Over the years the Chinese have made it their business to steal a lot of data. Some of it you would readily see as important militarily or for industrial espionage, but some of the data is much more arcane as to the reasons why they would make the efforts that they do to get it...
April 14, 2011 Added by:Headlines
According to Brenner, thousands of U.S. companies were targeted in the Aurora attacks, a great deal more than the 34 companies publicly identified. Brenner says the scale of the operation demonstrates China's "heavy-handed use of state espionage against economic targets..."
April 14, 2011 Added by:Headlines
"I don't want to tell you that the sky is falling... But I'm telling you that the threat environment is significant, and it is not possible for anyone to stay completely secure. It's just too hard, even for the most concerned agencies or private-sector entities..."
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013