Defense Systems

Don't be misled about Duqu malware

Cyber intelligence experts have issues with some of the claims being made about the Duqu malware.

Defense Systems

Cyberattack reporting requirements lack strength

New cyberattack disclosure requirements are designed to help publicly traded companies determine when they need to disclose that they have been the target of a cyberattack. But will they be effective?

Defense Systems

Cyber intelligence must drive cyber operations

The challenges of the cyber domain of conflict require new sources of intelligence on an unprecedented scale.

Defense Systems

October picked for Cybersecurity Awareness Month

It is surprising just how many people are unaware that October has been designated Cybersecurity Awareness Month.

Defense Systems

Private sector must heed new warning of grid vulnerabilities

To date, only modest movement has been detected to address the urgent need required to protect the power and smart grid from cyber espionage.

Defense Systems

The growing demand for cyber spies

In the cyber intelligence race, cyber spies are at the top of the list of badly needed resources and capabilities.

Defense Systems

Strong policy needed to counter cyber aggression

We must not allow our antiquated legislative processes and doctrine creation methods to constrain our offensive, defensive and intelligence collection capabilities in the cyber conflict domain.

Defense Systems

Mobile-device cyberattacks on the rise

Security awareness training for mobile devices should become mandatory if we are to stem the growing cyber threat to mobile platforms.

Defense Systems

Undisclosed cyberattack data puts nation at risk

Undisclosed cyber incident information in the nonclassified environment puts U.S. security and the economy at great risk.

Defense Systems

Did Stuxnet cyberattack delay the inevitable?

With the announcement of its nuclear power plant being up and running, it seems Iran is more determined than ever to build a nuclear warhead. Still, writes columnist Kevin Coleman, the country is behind schedule, thanks to Stuxnet.

Defense Systems

Monitoring social media helps thwart cyber threats

The monitoring and evaluation of potential threats on social media sites can help safeguard against the hostile cyber actions of extremists and terrorists.

Defense Systems

Cyber superiority requires creativity, innovation to meet threats

Continuous innovation and creativity coupled with out-of-box thinking are the fundamental requirements for intelligence collection and analysis if the defense community is to stay ahead of the changing threat environment.

Defense Systems

US cyber defenses outmatched by hackers

The blur between criminal acts in cyberspace, cyber terrorism, cyber espionage and acts of cyber aggression by rogue nations has placed U.S. defense forces in a very precarious position.

Defense Systems

North Korea's cyber capabilities cause alarm

North Korea's cyber ambitions have been an increasing concern in recent years.

Defense Systems

Cyber espionage game has high stakes

Security industry icon McAfee has discovered a cyber espionage program that has been under way for five years.

Defense Systems

Fear of a Stuxnet clone

Many cybersecurity professionals and government officials believe a clone of Stuxnet might not be far off.

Defense Systems

Battle damage increases from widespread cyberattacks

A new approach to cybersecurity is needed that supports continual change and adapts to the evolution of threats.

Defense Systems

A new frontline in cyber defense

As the cyber threat domain continues to evolve, so do the bot forces and combatants on the frontline.

Defense Systems

Will cyber laws mitigate the threat?

The piecemeal approach governments are taking in mandating action to improve cyber defenses wastes precious time and limits funding organizations have to expend on this problem.

Defense Systems

A contractor's first line of defense: common sense

The Defense Department has developed and published a draft rule requiring defense contractors to protect unclassified information from cyberattack.