Items Tagged with "Cyber Security"


94ae16c30d35ee7345f3235dfb11113c

The Wicked Witches of Cyberspace

September 27, 2012 Added by:Joel Harding

Lately I’ve been doing a deep dive on technologies that enable one to bypass filters, blocking and jamming, to get uncensored information into denied areas. When we use these technologies it is on behalf of goodness, apple pie and the American way. When someone else does its nefarious...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iran Increasing Tensions: Cyber Perspective

September 24, 2012 Added by:Pierluigi Paganini

A massive cyber attack could increase hostilities, anticipating a conventional strike, but the Government of Teheran is showing awareness of risks related to a cyber attack and it has started a massive propaganda campaign to show to the western world its cyber capabilities...

Comments  (4)

924ce315203c17e05d9e04b59648a942

An Open Letter to Senator Rockefeller

September 20, 2012 Added by:Richard Stiennon

Like in many matters involving science and technology, scientists and technologists should be brought into future deliberations on cyber legislation. The technologists that make the Internet operate and the security experts that battle to defend it need to be brought to the table...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

SOURCESeattle Write-Up

September 18, 2012 Added by:Robert M. Lee

As my perspective in infosec comes from my role as a Cyberspace Operations Officer in the Air Force, where most people say “infosec” I say “cyber” and try to speak on the broader domain impacts, deterrence, sharing threat intelligence, education, and the importance of working together...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

War in Cyberspace is about Definitions

September 18, 2012 Added by:Joel Harding

We are stuck in “Definitional Wars” or the struggle to get definitions approved that are not only accurate but widely accepted. A bigger problem is the constant evolution of technology and terminology, by the time a definition is published, it is usually obsolete...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

State-Sponsored Attacks or Not? That's the Question...

September 18, 2012 Added by:Pierluigi Paganini

Despite the use of cyber weapons and the damage caused by offensive operations being major concerns for intelligence agencies, clues are frequently discovered about attacks designed to steal sensitive information and intellectual property. Who is behind these cyber attacks?

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Important SCADA Security Tips

September 16, 2012 Added by:Brent Huston

Utilities have been computerizing their SCADA systems for years now. This has allowed them to save money, time and manpower and has increased their situational awareness and control flexibility. However, industrial control systems are usually not very robust and also very ‘dumb...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Assessment of Security Policies Within the DoD

September 11, 2012 Added by:Stefano Mele

According to a new report from the DoD Inspector General, security policies "often overlap, are fragmentary, or inconsistent". The sheer volume of policies that are not integrated makes it difficult for those in the field to ensure consistent and comprehensive policy implementation...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Is an International Cyber Regulatory Agency Needed?

August 30, 2012 Added by:Richard Stiennon

An international treaty and regulatory body will not gain much traction in the military academies and think tanks around the world. Why restrict a nation’s options in war fighting – especially when cyber weapons are inexpensive and could reduce the overall level of force required to achieve an end goal?

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Strengthening Partnerships to Address Cyber Threats

August 29, 2012 Added by:Infosec Island Admin

It only takes a single infected computer to potentially infect thousands of others. Partnerships are required across all levels of government, the private sector and internationally to share information about emerging threats and how to stop them, and coordinate mitigation efforts in response to cyber incidents...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyberwar! Let’s Work Through This, Shall We...

August 28, 2012 Added by:Joel Harding

So what is cyberwar? Most people feel that some country is going to launch attacks against another, trying to blind their military, mute the government and make life incredibly miserable for their citizens. If the attack is successful, part of the economic base will probably be permanently destroyed...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Oil and Natural Gas Pipeline Intrusion Campaign

August 28, 2012 Added by:Infosec Island Admin

ICS-CERT onsite analysis included a search for host-based and network-based indicators to identify additional hosts for further analysis. ICS-CERT hashed files from approximately 1700 machines and compared them to hashes of known malicious files and examined proxy logs to identify any suspicious network activity...

Comments  (1)

296634767383f056e82787fcb3b94864

The Poor State of Cyber Intelligence

August 23, 2012 Added by:Jeffrey Carr

The state of cyber intelligence as it is practiced by infosec professionals and others who are not trained in the science of rigorous analysis is often exponentially worse. Many analysts are missing huge gaps in the threat landscape and are doing a great disservice to their customers and their craft...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Thoughts On a U.S. Cyber Militia

August 23, 2012 Added by:Joel Harding

The Swiss are standing up a cyber command and they say their cyber warriors will be armed. Why wouldn’t this work in the US? First, we don’t trust our people as much as the Swiss. That is the nature of our culture, especially in the US. We are more paranoid, cynical and negative. We tend to micromanage...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

Saudi Aramco: Are We ready for an Escalation of Cyber Attacks?

August 22, 2012 Added by:Pierluigi Paganini

Incidents like this are bound to increase, as attacks by political groups and governments are occurring with increasing frequency, and it is a miracle that so far there has been no loss of life. But in the near future, every company and agency will need to prepare for such events in order to avoid catastrophic consequences...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MS-ISAC Meeting Explores Advanced Persistent Threats

August 22, 2012 Added by:Headlines

The event brought together state Chief Information Security Officers and other cyber security professionals from the nation's state, local and territorial governments, along with representatives from the U.S. Department of Homeland Security and industry experts for briefings on current cyber threats...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »