cyberattacks

September 1, 2020
Posted by Kimberly Underwood
The Five Eyes nations, including Australia, Canada, New Zealand, the United Kingdom and the United States, conducted extensive joint research on cyber breeches, culminating in an incident response playbook for the extended community of partners and network administrators. Credit: Shutterstock/Metamorworks

The cybersecurity representatives of the so-called Five Eyes intelligence partners are working together to improve cyber event incident response across the extended community of the countries of Australia, Canada, New Zealand, United Kingdom and the United States. 

May 28, 2020
By Kimberly Underwood
Characteristics of cyber actors give clues as to who poses a credible threat, experts say. Credit: Shutterstock/BABAROGA

The persistence, frequency and destructiveness of cyber attackers in this day and age propels digital defenders to search the Internet to understand how attackers operate in order to thwart attacks or fix vulnerabilities. Amidst all of the nefarious activity, cyber defenders must discern between credible threat players and less dangerous actors. One company, New York-based Flashpoint, searches the deep web and the dark web to gain intelligence on malicious cyber activity, including where, when, why and how bad actors are operating. More and more, threat actors are selling stolen, sensitive or valuable information, or they are selling awareness of vulnerabilities of companies.

November 1, 2019
By Kimberly Underwood
Cyber experts (l-r) Ray Letteer, Will Bush, Jean-Paul Bergeaux and Lisa Lee, discuss the risks of Internet of Things devices during AFCEA Quantico-Potomac’s Annual Cyber Security Panel event on October 31 at Marine Corps Base Quantico.

With the increase of available equipment that connects to the Internet, the military needs to address the associated cybersecurity risks. The Defense Department is lacking a comprehensive strategy of how to harness these so-called IoT devices, which could be based on existing cybersecurity frameworks, advised experts at an October 31 AFCEA Quantico-Potomac Chapter luncheon.

May 14, 2019
Kimberly Underwood
Lawmakers have created a new organization, the Cyberspace Solarium Commission, to tackle a national cybersecurity policy.

Legislators on Capitol Hill have formed the Cyberspace Solarium Commission, known as the CSC, which will put together a comprehensive U.S. cyber policy. Sen. Angus King (I-Maine), who is co-chairing the new organization with Rep. Michael Gallagher (R-Wisc.), announced the formation of the Geneva Convention-type commission in a call with reporters on May 13. The establishment of the commission was outlined in last year’s National Defense Authorization Act (NDAA), Sen. King said.

May 7, 2019
By Kimberly Underwood
The FBI’s Cyber Division is strengthening its investigative capabilities to battle more and more digital-based crimes from global adversaries, says Amy Hess, executive assistant director of the FBI’s Criminal, Cyber, Response, and Services Branch. Credit: Atlantic Council/Image Link

The FBI has a full plate: fighting public corruption, organized and white-collar crime and domestic and foreign terrorism; solving violent crimes; protecting civil rights; neutralizing national security threats, espionage and counterintelligence; and mitigating threats of weapons of mass destruction, among other responsibilities. And one part of the bureau is growing to protect the nation against cyber threats.