November 09, 2010 Added by:Jon Stout
The state of our cyber defense was summarized by Michael Chertoff when he concluded that it may take a digital 9-11 to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing...
October 30, 2010 Added by:Kevin L. Jackson
Showcasing the positive progress of Federal Government Agencies and their strategic partners in meeting the goals of their Mission Programs. This issue, Cloud Computing in Government, features the Trends and Best Practices on Cloud Computing in Government...
October 26, 2010 Added by:Jon Stout
An increasing number of adversaries are developing new options for penetrating the security of the United States through cyberspace, creating damage as well as conducting espionage. Cyberspace provides easily accessed and clear avenues along with the prospect of anonymity...
October 18, 2010 Added by:Dan Dieterle
Where many times cyber attacks are more espionage related, they could turn deadly if power, telecommunications or infrastructure is damaged in a large city. Civil security, medical and food supply could be the heaviest hit...
October 15, 2010 Added by:Bill Gerneglia
USCybercom will be run by General Keith Alexander who testified before Congress as his confirmation hearing, but a lot of the testimony has been censored. He did say that the Pentagon's computer systems are probed 250,000 times an hour or up to six million times a day...
October 14, 2010 Added by:Danny Lieberman
The rapid proliferation of Stuxnet into India, Pakistan and Indonesia is indeed an act of purposeful intelligence gathering – following the trail of removable devices and network connectivity used by people from countries collaborating with the Iranian nuclear weapons program...
October 06, 2010 Added by:Daniel Ruggles
DARPA in June 2010 announced the Clean‐Slate Design of Resilient, Adaptive Secure Hosts - CRASH. It relies on human biology to develop super-smart, highly adaptive, supremely secure networks. CRASH program looks to translate human immune system strategies into computational terms....
September 21, 2010 Added by:Joe Schorr
The ongoing investigation into the Stuxnet Worm may just be the smoking gun that brings validates the term Cyberwar and quiets those who see it as just a conspiratorial money-grab by the military-industrial bogeyman. This looks like a state-built worm that has been exposed in the wild...
September 20, 2010 Added by:Katie Weaver-Johnson
Third-parties are increasingly responsible for data breaches. A recent GAO report has revealed that federal agencies utilizing contracted workers are failing to implement contractual assurances with third-parties regarding the protection of sensitive information...
September 17, 2010 Added by:Theresa Payton
Safety & privacy - they can coexist but there is a healthy tension. Sometimes we give up privacy to be secure. Sometimes we guard our privacy and knowingly or unknowingly give up some of our security. It's a true conundrum. How much privacy are we willing to give up for that safety?
September 16, 2010 Added by:Ron Baklarz
Contrary to the TSA's insistence that scanned body images cannot be stored or recorded, it seems they can and are being retained. A lawsuit has been filed by the Electronic Privacy Information Center asking for an immediate injunction to stop TSA's body scanning program...
September 16, 2010 Added by:Danny Lieberman
Lynn's laundry lists of strategic objectives phrased in politically-correct corporate-speak are the wrong answer for improving cyber-security. When Lynn himself, speaks extensively about the need for speed and flexibility, the answer cannot be more government-funded monolithic, bureaucracies...
September 09, 2010 Added by:Richard Stiennon
Within a short time frame, two years at the most, the security industry will no longer be dominated by the handful of large security vendors, Symantec, McAfee, RSA the Security Division of EMC, or IBM. It will be dominated by large defense contractors...
September 07, 2010 Added by:Jon Stout
The new CYBERCOM, as a military and intelligence organization should approach the issue of Cyber Terrorism as a military campaign rather that a criminal action. Offensive Cyber operations and counter strikes will be approached with military precision like any other military campaign...
September 04, 2010 Added by:David Navetta
German state data protection authorities recently criticized both cloud computing and the EU-US Safe Harbor Framework. The comments reflect some concerns with recent trends in outsourcing and transborder data flows that multinationals would be well advised to address in their planning and operations...
September 03, 2010 Added by:Kevin L. Jackson
A few weeks ago I once again had the pleasure of participating in a private discussion on cloud computing with Mr. Vivek Kundra. What struck me in this most recent meeting was his views on the need to infuse geospatial information into the national policy decision making process...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013