Defense Systems

Employees need regular refresher in cybersecurity

We need to get in front of computer users on a monthly basis to reinforce basic and fundamental aspects of cybersecurity.

Defense Systems

Cyber weapons development: Why it is problematic

Cyber weapons development is problematic for venture capital investors because the proposed capabilities might already exist but are not known outside the classified environment.

Defense Systems

NSA shares cyber tools with defense contractors

Relentless attacks on U.S. defense contractors have prompted the National Security Agency to offer some of its sophisticated tools and techniques as a means to fortify the defense of these sensitive systems.

Defense Systems

Shortage of adequately trained cyber pros puts US at risk

A severe shortage of experienced cyber professionals leaves the nation vulnerable to cyberattacks that might inflict death and damage.

Defense Systems

Private sector needs way to submit cyber threat tips

Private-sector organizations and individuals need a way to easily and effectively communicate cyber threats to intelligence agencies.

Defense Systems

Cyberattack wave raises big questions

In light of the wave of recent attacks on U.S. targets, the U.S. government must determine its top priorities in cybersecurity.

Defense Systems

Digital Conflict: Lockheed tight-lipped on details of cyberattack

Some have criticized Lockheed Martin for not disclosing details about the large-scale cyberattack the company experienced in May. But the company might have good reason to do this.

Defense Systems

Digital Conflict: U.S. must work harder to thwart corporate espionage

Corporate espionage has reached an unprecedented level as countries and private organizations around the world vie with each other for technological dominance.

Defense Systems

Digital Conflict: China grows more proficient in cyber espionage

U.S. companies are waking up and beginning to take intellectual property theft much more seriously.

Defense Systems

Digital Conflict: Bin Laden raid nets largest intell cache ever

The computer data seized in the raid on Osama bin Laden's hideout in Pakistan will take months to process, according to defense and intelligence insiders.

Defense Systems

Citizen soldiers: Users must defend cyber front line

Computer users need regular training and instruction to raise their awareness of how to identify and counter cyber threats.

Defense Systems

Cyber superiority requires intelligence edge

A robust cyber intelligence capability that blends traditional approaches with modern technology is essential if the United States intends to gain superiority over adversaries.

Defense Systems

Leadership training needed for cyber warfare

Educational institutions throughout the military are trying to define the set of skills and knowledge that their leaders will need to prevail on the cyber battlefield of the 21st century.

Defense Systems

Tracking the cyber underground

Unlike the underground in World War II that helped the Allies defeat the totalitarian regimes they were fighting against, the underground that exists in the realm of cyber conflict is not on our side.

Defense Systems

Cyber dominance requires strong leadership

With Defense Secretary Robert Gates and Joint Chiefs of Staff Chairman Adm. Mike Mullen leaving soon, the Defense Department must find replacements capable of providing the leadership necessary to navigate the new hybrid environment of cyber warfare.

Defense Systems

Dire cyber scenarios may await U.S. infrastructure

New disruptive cyberattacks on the horizon and the proliferation of advanced cyber weapons pose increase danger to U.S. critical infrastructure.

Defense Systems

Utilities bear heavy cost of securing infrastructure

The cost of securing the nation's critical assets must be included in future utility rates.

Defense Systems

How do you react quickly to cyber aggression?

Although observers praised the remarkable speed with which the United Nations and western military powers established a no-fly zone in Libya, the speed with which it was accomplished is completely inadequate for an event of such magnitude in cyberspace.

Defense Systems

Assess your defense before a cyberattack

Those emergency services organizations that still have not planned, reviewed and implemented a cyber defense strategy must do so before they suffer a serious cyberattack.

Defense Systems

Stuxnet retaliation: What if Iran isn’t bluffing?

In the wake of last year's Stuxnet attack on its infrastructure, Iranian officials have threatened a retaliatory attack and also spoken about a recruitment program designed to increase the ranks of its cyber soldiers. The Islamic Republic is committed "to fight our enemies with abundant power in cyberspace and Internet warfare," said Brig. Gen. Gholamreza Jalali, who leads Iran's Passive Defense Organization. Although some question the quality of the country’s cyber cadre, do we really want to take a chance that Iran is bluffing?