Defense Systems

Is government the odd man out in cyber defense?

A study commissioned by Homeland Security on what worked and what didn’t work in the Conficker Working Group placed government collaboration in the "didn’t" column.

Defense Systems

Plan now to prevent data breaches -- or pay later

The Online Trust Alliance has released a Data Breach and Loss Incident Readiness Guide, with advice for preventing, detecting and responding to data security breaches.

Defense Systems

Infrastructure must withstand shock of cyberattacks

In the wake of Stuxnet it is clear that our critical infrastructure "is in play," says Black Hat founder Jeff Moss, and resilience is a strategic deterrent to attack.

Defense Systems

Test shows smart phones vulnerable to attack

A demonstration of an attack against an Apple iPhone at the Black Hat Technical Security conference showed that the phones might be smart, but they are not necessarily secure.

Defense Systems

U.S. should aim for cyber resilience, former DOD official says

Offense now trumps defense in the emerging theater of cyberwar, and he United States must focus on the resilience of its critical infrastructure, former Assistant Defense Secretary Franklin Kramer said Tuesday at the Black Hat Federal Briefings.

Defense Systems

Stuxnet falls short of Superworm, researcher says

Stuxnet is complex, sophisticated and specifically targeted, but its developers also made some mistakes, cybersecurity researcher Tom Parker said today at the Black Hat Federal Briefings.

Defense Systems

5 cyber threats to watch out for this year

Security pros see danger for 2011 in the proliferation of mobile consumer devices, sophisticated malware and the expansion of political conflict into cyberspace. On the brighter side, better law enforcement and the cloud might help make things better.

Defense Systems

Crypto rules changing for ID cards

A draft of revised specifications for cryptographic algorithms used with government PIV cards has been released with updated requirements.

Defense Systems

DOD sets standards to overwrite classified data

The standard for clearing drives by overwriting data comes from the Defense Department's National Industrial Security Program, which establishes requirements and limitations for the process.

Defense Systems

Navy tests telework tool for reserves

A CAC-enabled mobile access device could provide secure remote connections from any computer to resources inside the Navy network for Reserve personnel not on active duty.

Defense Systems

Feds experiencing critical cybersecurity staff shortage

Programs are under way to identify, educate and provide career paths for potential cybersecurity professionals demanded by government and private industry, a panel of experts said, but it will be years before the pipeline is producing.

Defense Systems

Air Force lab finds a simple way to support telework

The open-source Lightweight Portable Security tool provides trusted endpoints for remotely accessing DOD IT resources from untrusted environments, enabling secure Internet browsing and telework on sensitive systems.

Defense Systems

Telework tool: A DOD innovation goes wide

As legislation requiring agencies to move more aggressively to allow telework comes closer to passage, managers worry about security. A tool the Air Force developed could ease their minds.

Defense Systems

Deadline looms for CyberPatriot competition

CyberPatriot, a national high school competition put on by the Air Force Association, is part of an effort to stimulate interest in science education as well as recruit the future professionals needed to protect cyberspace.

Defense Systems

DOD's response could be driving traffic to WikiLeaks

Traffic data shows that government briefings and other activities could be driving traffic to the controversial WikiLeaks site that leaked documents about the war in Afghanistan.

Defense Systems

Panel: U.S. lacks legal framework to fight in cyberspace

A panel of experts said the lack of clear policies and legal framework for waging cyber war could hinder the nation in defending itself and waging war in the new military domain of cyberspace.

Defense Systems

The cyberattack that awakened the Pentagon

Deputy Defense Secretary William J. Lynn today outlined the five pillars of the DOD’s strategy for defending against and responding to cyber attacks against the nation’s critical infrastructure and .mil networks.

Defense Systems

U.S. needs strong cyberwarfare doctrine, says former NSA director

Retired General Michael Hayden, former head of the CIA and NSA, said today at the Black Hat Briefings that the U.S. lacks an effective military and political doctrine for conducting and defending itself against cyber war.

Defense Systems

How the Army ensures the reliability of its troop-tracking system

The Blue Force Tracking system uses a global network to deliver command and control and situational awareness to the soldier in the field, and the Army has turned to NitroSecurity for security management.

Defense Systems

DOD struggles to define cyber war

The DOD is creating a new Cyber Command to defend the military information infrastructure but still is working to come up with a clear definition of a doctrine for cyber war, says Undersecretary James Miller.