Blog Posts Tagged with "Government"
Suits and Spooks DC 2015: The Agenda - Last Chance to Register
January 29, 2015 Added by:Mike Lennon
Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.
Comments (2)
Cyber Security Goes Ballistic
April 16, 2013 Added by:Jarno Limnéll
Cyberweapons are now comparable to the ballistic nuclear missile arsenal of the US, which also resides under the jurisdiction of the President. Giving the President cyber-initiative responsibilities speaks volumes regarding the serious attitude to which they are treated.
Comments (0)
Defining the Qualities of Cyber Warfare
February 14, 2013 Added by:Jarno Limnéll
Cyber warfare is one of the hottest topics currently trending in newsfeeds and, although many are quick to use the term, not everyone fully understands the concept.
Comments (1)
How the US is Preparing for Cyber Warfare
January 29, 2013 Added by:Pierluigi Paganini
The US and Israel are considered in cyber warfare context to be the most advanced nations, and according the international press they have been been involved in the creation of the first worldwide recognized cyber weapon, Stuxnet, and many other related spy tools kits such as Flame...
Comments (1)
Perfect Citizen, US vulnerability assessment program on critical infrastructures
January 02, 2013 Added by:Pierluigi Paganini
CNET web site has published a news on a secret National Security Agency program named Perfect Citizen that is targeting on large-scale the control systems inside utilities, including power grid and gas pipeline controllers, with the purpose to discover security vulnerabilities.
Comments (0)
The Dutch, the Yanks, the Cloud and YOU
December 13, 2012 Added by:Don Eijndhoven
Recently a research project by the Amsterdam University [PDF Alert] revealed that US law allows for the US government to access information stored in the Cloud, by (ab)using the PATRIOT act...
Comments (0)
Flipping Malware: A Profit Opportunity for Corporate IT Departments
December 09, 2012 Added by:Jeffrey Carr
Some of the more forward-looking DOD contractors who have robust internal CERT with engineers who do reverse-engineering could be in the best position to offer free or low-cost network defense to corporations who want to "flip" the malware found on their network for a nice profit...
Comments (1)
Who Needs Words for Wars?
December 09, 2012 Added by:Jayson Wylie
This article holds little validity in my mind and I’m sure that runs up the chain of the Government to President Obama who is the only one, at this time, that seems to be able to have a majority consensus for a direction or secret directives for Cyberspace activities, rules and laws...
Comments (0)
HostDime, SoftLayer, et al, Need to be Federally Bitch-Slapped For Violating Syrian Sanctions
November 30, 2012 Added by:Jeffrey Carr
When the New York Times released its story that some of the Syrian government's websites were hosted outside of Syria, I wasn't surprised to see SoftLayer as one of the hosts. They are the company that hosted StopGeorgia.ru, the Russian forum which coordinated many of the cyber attacks...
Comments (0)
Our Massively Dysfunctional Cyber System
November 28, 2012 Added by:Joel Harding
What should be done to stop theft of intellectual property by state actors (China) would require a Presidential Finding but our leadership structure is devoid of real leaders. That is not a political statement, that is a statement about our country...
Comments (0)
Google Transparency Report: Let's Read it Together
November 17, 2012 Added by:Pierluigi Paganini
Government surveillance is one of the most interesting security topics. In many cases governments for various reasons, such as Homeland Security, spy on users tracking their activities on the Internet, intercept their communications, and gain access to email accounts...
Comments (0)
US Cyber Security Direction
November 07, 2012 Added by:Jayson Wylie
President Obama stated an Executive Order to be instilled which may be in a better direction but nothing definitive or out yet nor am I expecting a solid direction or hitting upon the finer notes in the short term. Let’s not kid ourselves. Having a point-of-presence on the Internet is dangerous...
Comments (0)
Canada´s audit on cyber threats to national critical infrastructure
October 25, 2012 Added by:Stefano Mele
The Office of the Auditor General of the Canada revealed in an audit made public October 23 that "the cyber threat environment is evolving more rapidly than the Canada government´s ability to keep pace"...
Comments (0)
Fact Checking Obama's Misleading Answer About Warrantless Wiretapping
October 24, 2012 Added by:Electronic Frontier Foundation
Jon Stewart boldly went where no mainstream reporter has gone: asking President Obama why he embraced Bush’s warrantless wiretapping program after campaigning against it. While Stewart’s question was commendable, Obama’s answer was puzzling because it seems so obviously untrue...
Comments (2)
Anonymous vs Wikileaks...you can condemn a man but not wipe out an ideology
October 18, 2012 Added by:Pierluigi Paganini
Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for this reason security expert all over the world are trying to deeply analyze the different movements of dissent and their mutual relationships...
Comments (0)
The Derecho Named Cyber
October 10, 2012 Added by:Joel Harding
The discussions we had back in the mid-90s are still ongoing, we still don’t have a proper information sharing cybersecurity bill and people still don’t trust the government to maintain their privacy. Please, members of congress and business leaders, work on cybersecurity as if our lives depend on it...
Comments (1)
- The Rise of Ransomware and the Consequences for SMBs
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them