Items Tagged with "National Security"
May 18, 2012 Added by:Rafal Los
Here's the problem - when it comes to critical infrastructure protection it's very difficult to legislate and regulate the organizations that matter into a state of better security. The problem is that in order to enforce policy and rules there either have to be consequences to failing, or incentives not to fail - or both...
May 18, 2012 Added by:Headlines
This statement of intent will help enhance situational awareness and information sharing on cybersecurity issues, increase collaboration and sharing of cybersecurity best practices, and create opportunities for training and cooperation in cyber exercises...
May 18, 2012 Added by:Headlines
"As the lead major command for space and cyberspace, Air Force Space Command is chartered to organize, train and equip space and cyberspace forces and is tasked to review and efficiently use the resources assigned to the command," said Lt.Gen. Michael J. Basla...
May 17, 2012 Added by:Headlines
"It has been a tremendous honor for me to have served in this role and to have worked with such dedicated and professional colleagues both in the government and private sector. We have made real progress in our efforts to better deal with the risks in cyberspace..."
May 16, 2012
A business does not need to be located in the PRC to fall victim to espionage. This problem includes old fashioned spying outside of China, sometimes by a classic sleeper agents or by a PRC-owned or invested firm that assesses, develops, and recruits an agent inside your firm...
May 16, 2012 Added by:Pierluigi Paganini
"Right now we have access to every classified database in the U.S. government. It’s a matter of when we leak the contents of those databases, not if. You know how we got access? We didn’t hack them. The access was given to us by the people who run the systems…"
May 14, 2012 Added by:William Mcborrough
We know that some attacks on our privately owned critical infrastructure have been attributed to foreign government networks. Would it be wise to license companies to attack these networks? The last thing we need is an international incident started by some SysAdmin..
May 11, 2012 Added by:Headlines
"We deal with all aspects of cyber security. How to defend all our information. We have a lot of R&D to protect. There are those who want to get in and maliciously disable or damage or change information. We’re so heavily dependent on our network for a national security role..."
May 10, 2012 Added by:Electronic Frontier Foundation
The FAA finally released the names of the government agencies which applied for and received authorization to fly drones in the US. Unfortunately, the list did not include what drones were authorized, what they were being used for, or what information they were collecting...
May 09, 2012 Added by:Scot Terban
Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...
May 08, 2012 Added by:Headlines
"The legally mandated role of the government is to provide for the common defense, and they're willing to spend pretty much whatever it takes... If you're in a private organization, your legally mandated responsibility is to maximize shareholder value. You can't spend just anything..."
May 08, 2012
Cyber attacks have increased significantly in number and sophistication resulting in the Federal Government and private sector partners expanding their cybersecurity efforts. US-CERT reported an over 650-percent increase in the number of incidents reported by federal agencies...
May 07, 2012 Added by:Michelle Valdez
The problem with CISPA involves all the information added under one of the approved amendments. The vagueness about what information can be shared has caused most of the concern – especially that catch all category of “to protect the national security of the United States”...
May 07, 2012 Added by:Pierluigi Paganini
Cybersecurity is identified as a priority issue to enhance the efficiency of prevention and incident response. The report invites federal and private sector partners to accelerate initiatives to enhance data collection, detect events, raise awareness, and respond to incidents...
May 07, 2012
Private sector advocates such as Clinton believe some of the current legislation under consideration is far too punitive in nature, and would disincentivize companies from both investing in better security measures and from disclosing data loss events...
May 07, 2012 Added by:Headlines
“Analysis of the malware and artifacts associated with these cyber attacks has positively identified this activity as related to a single campaign from a single source. It goes on to broadly describe a sophisticated 'spear-phishing' campaign..."