Tagged: cyber

Executive Order on Improving Critical Infrastructure Cybersecurity

Yesterday, President Obama signed an Executive Order on Improving Critical Infrastructure Cybersecurity. From the Executive Order: “Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront....

New Report on Recent Cyber Crime/Scams

Yesterday, the Internet Crime Complaint Center (IC3), which is a partnership between the FBI and the National White Collar Crime Center (NW3C), released a report titled, “Internet Crime Complaint Center’s (IC3) Scam Alerts.” The report is “based upon information from law enforcement and complaints submitted to the IC3, details recent...

Vision Documents Signed by Navy’s Information Dominance and Cyber Leaders

This week, officials of the U.S. Navy signed three documents outlining how the Navy will continue to maintain “Information Dominance,” or superior “operational advantage,” in decision making and warfighting through the integration of its technical “information functions, capabilities, and resources.” Specifically, the three documents describe Information Dominance as a combination...

New Report on Emerging Cyber Threats in 2013

A new report has been released by the Georgia Institute of Technology titled “Emerging Cyber Threats Report 2013.” The report was released following the annual Georgia Tech Cyber Security Summit (GTCSS) that was held November 14, 2012. The GTCSS provides a forum which allows stakeholders to collaborate in the pursuit...

Chinese Capabilities for Computer Network Operations and Cyber Espionage

The U.S.-China Economic and Security Review Commission has received its latest report which details the capabilities and threat potential of Chinese state-sponsored cyber operations and cyber criminals originating in China. Entitled, Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage , this assessment expands upon...

Jihadists and Crime on the Internet

Jihad, Crime, and the Internet: Content Analysis of Jihadist Forum Discussions This is a recent report that was submitted to the National Institute of Justice in fulfillment of a grant from the Department of Justice. The report focuses on how Jihadists and terrorists use forums on the internet. Over the...

DHS Blueprint for a Secure Cyber Future

The Department of Homeland Security’s (DHS) report Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise “builds on the Department of Homeland Security Quadrennial Homeland Security Review Report’s strategic framework by providing a clear path to create a safe, secure, and resilient cyber environment for...

White House Releases Federal Cybersecurity R&D Strategic Plan

Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program Today, the Office of Science and Technology Policy (OSTP) released a new report that highlights the US’s strategic plan to secure and “fundamentally improve cyberspace.” According to the OSTP, this report is the result of President Obama’s order...