Items Tagged with "National Security"


69dafe8b58066478aea48f3d0f384820

DoD Comments on Cyberwar and the Law of Armed Conflict

April 13, 2012 Added by:Headlines

“We’re trying to think about cyber operations as a new form of policy tool that gives the president or the secretary of defense new options. We’re not actively looking to mount operations in cyberspace... We want to do it only when appropriate and when there’s a good reason to.."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AQ Air: Mostly Hot - Not So Interesting

April 12, 2012 Added by:Infosec Island Admin

In the rar file that was uploaded to multiple locker sites were five video files that were taken from the internet and re-purposed for the release. Metadata from the files shows that they were handled on a Windows machine using the following software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Officials Warn of Global Cyber Arms Race

April 11, 2012 Added by:Headlines

"What we're looking at is a global cyber arms race. It's not proceeding at a leisurely or even a linear fashion but in fact is accelerating. I wouldn't claim that it's following Moore's law, but the curve looks kind of similar," said U.S. Cyber Command's Rear Admiral Samuel Cox...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

An Anatomy of US Cyber Command

April 10, 2012 Added by:Dan Dieterle

When you think of USCYBERCOM, the Air Force comes to mind immediately. Since the beginning, the Air Force has been a driving force behind US Cyber War. But there is another group that is more responsible for the creation of USCYBERCOM and actually forms the Command’s backbone...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

National Collegiate Cyber Defense Competition 2012

April 09, 2012 Added by:Headlines

"Our nation is under constant attack... from individuals stealing personal financial information to sophisticated terrorist networks seeking to hack into our electrical grid and be a detriment to our way of life. Our nation continues to seek out and employ the best and brightest..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Commander Leads Air Force Cyber Warriors

April 09, 2012 Added by:Headlines

As commander of 50 NOG, Sutherland is responsible for 1,500 military, DoD civilian and contractor personnel assuring access to cyberspace by operating and maintaining the $6.2 billion Air Force Satellite Control Network and the $100 million communications and information gateway...

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

Meetings with DOD and Congress on SCADA Security

April 09, 2012 Added by:Joe Weiss

I was asked by DOD how to get an organization to address OT security. The only chance for OT security to succeed is if senior management drives it. There are only a few utilities whose senior management mandated they be secure not just compliant. What a sorry commentary...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Cybersecurity Problems Found in Electrical Infrastructure

April 07, 2012 Added by:Joel Harding

DOE is in charge of locating and fixing critical infrastructure problems within the energy sector. Do they, in turn, report to DHS if it has to do with critical infrastructure? Does DHS oversee DOE’s cybersecurity problems, their critical infrastructure problems or...?

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Infosec: The Eternal Struggle

April 06, 2012 Added by:Infosec Island Admin

The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House: Big Data is a Big Deal

April 05, 2012 Added by:Headlines

By improving our ability to extract knowledge and insights from large and complex collections of digital data, the initiative promises to help accelerate the pace of discovery in science and engineering, strengthen our national security, and transform teaching and learning...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Coming Soon: FUD FUD FUD!

April 03, 2012 Added by:Infosec Island Admin

The terrorists may aspire to this, as nebulous as that aspiration can be from an image like the one in question. This in NO WAY means we are doomed or that NYC will be seeing an attack like 9/11 again directly relating to this piece of so called artwork...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Real Questions about Huawei for US Rep. Frank Wolf

April 03, 2012 Added by:Joel Harding

The Congressman was obviously attempting to either persuade the US China Economic and Security Commission or reassure them about Huawei. He passionately made a one-sided statement but failed to provide any evidence aside from one news report in that day’s Washington Post...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Taking the Crowbar to Cyber-Denying Eyes

April 03, 2012 Added by:Don Eijndhoven

Making your own arbitrary definition of Cyber Warfare and discounting MOUNTAINS of evidence that undermine your point isn't very scholarly to say the least. Can we please stop giving a stage to these people who are obviously cherry-picking their way to an uninformed argument?

Comments  (9)

69dafe8b58066478aea48f3d0f384820

Rogers-Ruppersberger Cyber Bill Gains Momentum

April 02, 2012 Added by:Headlines

“Every day U.S. businesses are targeted by nation-state actors like China for cyber exploitation and theft. This consistent and extensive cyber looting results in huge losses of valuable intellectual property, sensitive information, and American jobs..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

GAO Report: IT Supply Chain Security Risks

March 30, 2012

The exploitation of information technology (IT) products and services through the global supply chain is an emerging threat that could degrade the confidentiality, integrity, and availability of critical and sensitive agency networks and data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DOD Needs Industry’s Help to Battle Cyber Attacks

March 29, 2012 Added by:Headlines

“Today, we’re in the forensics mode. We need to see the attack. If we can’t see the attack, we can’t stop it. We have to have the ability to work with industry - our partners - so that when they are attacked, they can share that with us immediately,” said Gen. Keith Alexander...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »