Strong legal issues must be addressed before companies take cyber active defense into their own hands.
While serving as the first luncheon keynote speaker at AFCEA’s Defensive Cyber Operations Symposium, Lt. Gen. Ronnie D. Hawkins Jr., USAF, outgoing director of the Defense Information Systems Agency (DISA), compared cyber and traditional weapons.
The password is vanishing. The cumbersome, multicharacter, hard-to-remember bane of Internet usage finally is dying. As biometric and behavioral monitoring technologies evolve, solutions that embrace revolutionary new identity verification systems based on users’ behaviors at the keyboards promise to replace the expiring relic.
A conflict erupting on the Korean Peninsula could lead to any of a number of developments and outcomes, and its effects—including cyber operations—might not be limited to the Koreas and the U.N. forces involved there.
Wireless links now are permeating virtually every electronic device in society, but they bring with them the vulnerabilities and threats that characterize cyberspace today.
New cyber crime facility provides enhanced operational and training capabilities to meet the growing cyber mission.
U.S. lawmakers launched a bipartisan bid to boost the Department of Homeland Security's powers to better oversee cybersecurity compliance by federal agencies and intervene when they might fail to safeguard their networks.
The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...
The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.
Hackers behind cybersecurity attacks on the U.S. federal government through the Office of Personnel Management pilfered personal information from a much more significant number of current and former employees than previously reported.
Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?
The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.
Cyberspace is being accepted throughout the U.S. Army as a warfighting domain. However, many soldiers outside of the U.S. Army Signal Corps do not grasp the concept of cyberspace as an operational realm. Empowering them with that understanding is essential to operational success.
Cyber attacks by foreign governments and criminals now threaten U.S. national and economic security more than terrorism, experts say, and the perils increasingly erode the country’s safety as well as its coffers. While eradicating cyberthreats is not a realistic option, developing cyber radar systems that predict and warn, with keen precision, of incoming attacks just might be.
A U.S. cybersecurity threat analysis center that allows financial institutions around the world to share cyber attack data and solutions is adopting an automated system that permits information to be disseminated more quickly and efficiently, enhancing protection for the financial segment of the critical infrastructure.
The “2015 Verizon Data Breach Investigations Report,” released this spring, states that the top three industries affected by cybermarauders are public, information and financial services. This is unchanged from the annual report’s results last year. The report adds that the estimated financial loss from 700 million compromised records totals $400 million.
Adversaries are becoming smarter and more active; their rate of growth itself is disruptive. To see this, all cyber professionals have to do is pay attention.
Cyberthreats come from different areas—whether they represent terrorists, industrial espionage, the Islamic State of Iraq and the Levant (ISIL), organized crime, nation-states or even “hacktivists” trying to shape the political environment. Multiple sources with diverse motivations are affecting activities throughout cyberspace, and there is no one-size-fits-all remedy or “silver bullet” solution.
A more diverse group of players is generating a growing threat toward all elements of the critical infrastructure through cyberspace. New capabilities have stocked the arsenals of cybermarauders, who now are displaying a greater variety of motives and desired effects as they target governments, power plants, financial services and other vulnerable sites.
In what has become one of the White House’s highest priorities, the federal government is forming digital services teams to address the mounting number of cybersecurity breaches threatening the nation’s security and coffers, according to government’s top chief information officer.