Tagged: cybersecurity

U.S. Higher Education System Fails to Prepare Leaders for Era of Cyber Threat

In a new study released March 26, 2013, the Pell Center of Salve Regina University found that the majority of America’s “top” academic institutions are failing to provide students with the knowledge and tools necessary to combat cyber threats in the professional world. The report argues that “cyber defense requires...

APT1: Exposing One of China’s Cyber Espionage Units

Mandiant, a U.S. security firm, has published a report that links “China’s military to cyberattacks on more than 140 U.S. and other foreign corporations and entities.” The report, “APT1: Exposing One of China’s Cyber Espionage Units,” is the culmination of investigations over several years which provide evidence that an Advanced...

Executive Order on Improving Critical Infrastructure Cybersecurity

Yesterday, President Obama signed an Executive Order on Improving Critical Infrastructure Cybersecurity. From the Executive Order: “Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront....

CHDS Director Ted Lewis’ Remarks on Cyber Insecurity

Last week, NPS Center for Homeland Defense and Security (CHDS) director Dr. Ted Lewis posted a blog entry, “Cyber Insecurity: Black Swan or Headline?”, onto the Homeland Security Watch blog site. The post addresses the new concept of “cyber insecurity” and its relationship to the United States’ deep-rooted “military industrial...

New Report on Emerging Cyber Threats in 2013

A new report has been released by the Georgia Institute of Technology titled “Emerging Cyber Threats Report 2013.” The report was released following the annual Georgia Tech Cyber Security Summit (GTCSS) that was held November 14, 2012. The GTCSS provides a forum which allows stakeholders to collaborate in the pursuit...

How Internet Schemes Work and the Cyber-Scammers’ Scorecard for 2011

A new report provides consumers and law enforcement not only data statistics for cyber-crime but an explanation of how each internet scam is run as well. 300,000 alleged criminal acts and attempts provide the data on which the Internet Crime Complaint Center’s (IC3) 2011 Internet Crime Report is based. Unfortunately,...

Chinese Capabilities for Computer Network Operations and Cyber Espionage

The U.S.-China Economic and Security Review Commission has received its latest report which details the capabilities and threat potential of Chinese state-sponsored cyber operations and cyber criminals originating in China. Entitled, Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage , this assessment expands upon...

DHS Blueprint for a Secure Cyber Future

The Department of Homeland Security’s (DHS) report Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise “builds on the Department of Homeland Security Quadrennial Homeland Security Review Report’s strategic framework by providing a clear path to create a safe, secure, and resilient cyber environment for...

White House Releases Federal Cybersecurity R&D Strategic Plan

Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program Today, the Office of Science and Technology Policy (OSTP) released a new report that highlights the US’s strategic plan to secure and “fundamentally improve cyberspace.” According to the OSTP, this report is the result of President Obama’s order...

New Report on Espionage and the Theft of US Economic Secrets in Cyberspace

Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011 This annual report to congress highlights the threat to the United States from foreign economic collection and espionage in cyberspace. The report was compiled by the Office of the National Counterintelligence...