Blog Posts Tagged with "Pentagon"

Ffc4103a877b409fd8d6da8f854f617e

Pentagon Ups Cyber Espionage Accusations Against China

May 07, 2013 Added by:InfosecIsland News

A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber spying is focused on the US government, as well as American corporations.

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DOD: Key to Cyber Defense is Highly Skilled People

July 31, 2012 Added by:Headlines

Cyber war is complicated and defending systems demands world-class engineers and technicians and the military must compete with other public agencies and the private sector in attracting these specialists. Having the right people in the right places with the right training is the best defense against any attack...

Comments  (1)

E11e506024f5d2b70f037b9af4734f33

Department of Defense's Cloud Computing Strategy

July 12, 2012 Added by:Stefano Mele

The DOD has specific challenges that require careful adoption considerations, especially in areas of cybersecurity, continuity of operations, information assurance, and resilience. Additional challenges include service acquisition and funding, data migration and management, and overcoming network dependence...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cloud Insecurity? NSA Chief Keith Alexander Thinks Not

June 14, 2012 Added by:Headlines

“If you’re moving information into the cloud, it just seems to me that all kinds of nasty activity could go on in there. I would take a Missouri approach and say, ‘prove it to me, show it to me,’ how it’s more secure,” said former director of intelligence, surveillance and reconnaissance for the Air Force...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Pentagon to Regionalize Cyber Response Capabilities

June 12, 2012 Added by:Headlines

“Although cyberspace presents some very unique characteristics, this transitional model is designed to continue DoD’s efforts at normalizing cyber as an integrated function with other land, maritime, air and space functions,” DoD spokesperson Lt. Col. April Cunningham said...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Plan X: Developing US Cyber Warfare Capabilities

June 04, 2012 Added by:Pierluigi Paganini

Plan X, launched by DARPA, comes at a crucial moment in which the strategic importance of the garrison in cyberspace has become a prerequisite. We have crossed the threshold of a new era, one where we will fight wars with bits instead bullets, one in which the hackers are a new generation of soldier...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Howard Schmidt on Partnership Developments in Cybersecurity

May 23, 2012 Added by:Infosec Island Admin

Earlier this month, we gave the green light to two long-awaited Defense Industrial Base (DIB) efforts designed to help companies protect critical information. The programs allow eligible DIB companies and the Government to share cybersecurity information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Developments Involving the People’s Republic of China

May 21, 2012 Added by:Headlines

"In 2011, computer networks and systems around the world continued to be targets of intrusions and data theft, many of which originated within China. Although some of the targeted systems were U.S. government-owned, others were commercial networks owned by private companies..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The US Cyber Guard Begins

May 17, 2012 Added by:Joel Harding

US cyber defenses will now include more than just the US Cyber Command and the Department of Homeland Security. Eventually it may include somewhere around 8,000 contractors, mostly defense contractors. Of course the conspiracy theorists will begin screaming “big brother”...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Defense Industrial Base Cyber Security Program

May 14, 2012 Added by:Infosec Island Admin

The United States continues to face a significant risk that critical Defense information networks can be compromised by malicious actors resulting in economic losses or damage to national security. The DIB CS/IA Program is designed to improve DIB network defenses...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon CIO Discusses DoD's Cyber Defense Strategy

May 11, 2012 Added by:Headlines

"We deal with all aspects of cyber security. How to defend all our information. We have a lot of R&D to protect. There are those who want to get in and maliciously disable or damage or change information. We’re so heavily dependent on our network for a national security role..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Military Evaluates SIPRNet Smart Card to Protect Networks

April 24, 2012 Added by:Headlines

"As we learned through the events of Wiki Leaks, we had a blind spot in protecting our classified networks... We have a national strategy and program to implement a Public Key Infrastructure hardware based authentication system on the classified network - hence the SIPRNet token..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Officials Examine the Militarization of Cyberspace

April 16, 2012 Added by:Headlines

"If there is significant information of a cyber-event, we reserve the right to use tools in our toolbox,. When does a cyber-attack achieve critical level? When one can attribute an attack that deliberately causes loss of life," a U.S. official stated...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD to Expand International Cybersecurity Cooperation

April 16, 2012 Added by:Headlines

“I think it’s very important to do as much as we can to prevent and mitigate the threat at home, but we can only get so far acting unilaterally. We have to act in concert… with countries around the world to address this problem...”

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DoD Comments on Cyberwar and the Law of Armed Conflict

April 13, 2012 Added by:Headlines

“We’re trying to think about cyber operations as a new form of policy tool that gives the president or the secretary of defense new options. We’re not actively looking to mount operations in cyberspace... We want to do it only when appropriate and when there’s a good reason to.."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Defense Department to Accelerate Cyber Weapons Development

April 10, 2012 Added by:Headlines

“Cyberweapons are fundamentally different... You can make a general-purpose fighter plane and it will function more or less the same in the Pacific as in the Atlantic. The same is not true for going after a Russian cyber-target versus a Chinese target..."

Comments  (0)

Page « < 1 - 2 - 3 > »