Defense Systems
Employees need regular refresher in cybersecurity
We need to get in front of computer users on a monthly basis to reinforce basic and fundamental aspects of cybersecurity.
Defense Systems
Cyber weapons development: Why it is problematic
Cyber weapons development is problematic for venture capital investors because the proposed capabilities might already exist but are not known outside the classified environment.
Defense Systems
NSA shares cyber tools with defense contractors
Relentless attacks on U.S. defense contractors have prompted the National Security Agency to offer some of its sophisticated tools and techniques as a means to fortify the defense of these sensitive systems.
Defense Systems
Shortage of adequately trained cyber pros puts US at risk
A severe shortage of experienced cyber professionals leaves the nation vulnerable to cyberattacks that might inflict death and damage.
Defense Systems
Private sector needs way to submit cyber threat tips
Private-sector organizations and individuals need a way to easily and effectively communicate cyber threats to intelligence agencies.
Defense Systems
Cyberattack wave raises big questions
In light of the wave of recent attacks on U.S. targets, the U.S. government must determine its top priorities in cybersecurity.
Defense Systems
Digital Conflict: Lockheed tight-lipped on details of cyberattack
Some have criticized Lockheed Martin for not disclosing details about the large-scale cyberattack the company experienced in May. But the company might have good reason to do this.
Defense Systems
Digital Conflict: U.S. must work harder to thwart corporate espionage
Corporate espionage has reached an unprecedented level as countries and private organizations around the world vie with each other for technological dominance.
Defense Systems
Digital Conflict: China grows more proficient in cyber espionage
U.S. companies are waking up and beginning to take intellectual property theft much more seriously.
Defense Systems
Digital Conflict: Bin Laden raid nets largest intell cache ever
The computer data seized in the raid on Osama bin Laden's hideout in Pakistan will take months to process, according to defense and intelligence insiders.
Defense Systems
Citizen soldiers: Users must defend cyber front line
Computer users need regular training and instruction to raise their awareness of how to identify and counter cyber threats.
Defense Systems
Cyber superiority requires intelligence edge
A robust cyber intelligence capability that blends traditional approaches with modern technology is essential if the United States intends to gain superiority over adversaries.
Defense Systems
Leadership training needed for cyber warfare
Educational institutions throughout the military are trying to define the set of skills and knowledge that their leaders will need to prevail on the cyber battlefield of the 21st century.
Defense Systems
Tracking the cyber underground
Unlike the underground in World War II that helped the Allies defeat the totalitarian regimes they were fighting against, the underground that exists in the realm of cyber conflict is not on our side.
Defense Systems
Cyber dominance requires strong leadership
With Defense Secretary Robert Gates and Joint Chiefs of Staff Chairman Adm. Mike Mullen leaving soon, the Defense Department must find replacements capable of providing the leadership necessary to navigate the new hybrid environment of cyber warfare.
Defense Systems
Dire cyber scenarios may await U.S. infrastructure
New disruptive cyberattacks on the horizon and the proliferation of advanced cyber weapons pose increase danger to U.S. critical infrastructure.
Defense Systems
Utilities bear heavy cost of securing infrastructure
The cost of securing the nation's critical assets must be included in future utility rates.
Defense Systems
How do you react quickly to cyber aggression?
Although observers praised the remarkable speed with which the United Nations and western military powers established a no-fly zone in Libya, the speed with which it was accomplished is completely inadequate for an event of such magnitude in cyberspace.
Defense Systems
Assess your defense before a cyberattack
Those emergency services organizations that still have not planned, reviewed and implemented a cyber defense strategy must do so before they suffer a serious cyberattack.
Defense Systems
Stuxnet retaliation: What if Iran isn’t bluffing?
In the wake of last year's Stuxnet attack on its infrastructure, Iranian officials have threatened a retaliatory attack and also spoken about a recruitment program designed to increase the ranks of its cyber soldiers. The Islamic Republic is committed "to fight our enemies with abundant power in cyberspace and Internet warfare," said Brig. Gen. Gholamreza Jalali, who leads Iran's Passive Defense Organization. Although some question the quality of the country’s cyber cadre, do we really want to take a chance that Iran is bluffing?
Almost There!
Help us tailor content specifically for you: