Search Results for "" Security ""
Threat Grows for Cyber-Physical Systems
Intelligence Leaders Seek Common Interests With China

Cyber and Intelligence Need Each Other
Closing the Door on Iris Recognition Vulnerabilities

Telecommunications Leaves Mark on Afghanistan
A massive telecommunications infrastructure modernization effort in Afghanistan is designed to contribute to socioeconomic development; provide entry into the global information society; and support national prosperity, sustainability and stability. A key part of that effort is coming to fruition: officials with a telecommunications advisory group in that country expect the completion very soon—possibly this month—of a fiber-optic ring around the nation’s perimeter.

The Most Capable Cyber Attackers Are Less Likely to Attack
The most damaging cyber attacks possible are among the least likely to happen, because the powers capable of undertaking them are unlikely to launch them, according to an expert with the Office of
Data Integrity Is the Biggest Threat in Cyberspace
The most serious national security threat looming in cyberspace may be the potential for vital data to be altered by cybermarauders, according to a cyber expert with the Office of the Director of N
SCADA Systems Face Diverse Software Attack Threats
Supervisory control and data acquisition (SCADA) systems face numerous threats from cybermarauders coming at them from any of a number of directions. Some systems could suffer malware attacks even though they are not the intended targets, according to a leading security expert.
It’s Culture, Not Technology, That Inhibits Cyber Information Sharing
Resistance to change may prove to be the biggest impediment to information sharing among the cyber intelligence community.
Cyber Sabotage Attacks the Century’s Worst Innovation
One of the world’s leading experts on cybersecurity calls cyber sabotage attacks “the worst innovation of this century.” Cyberweapons have become too dangerous, and cyberattack can lead to visible and important damage to the critical infrastructure or telecommunications. And, attribution is almost impossible.