Tagged: cybersecurity

Cyberpower: Security Strategy Issues for State Actors in the Internet-dependent Age

The Defence Academy of the United Kingdom report “The Global Cyber Game: The Defence Academy Cyber Inquiry Report” “presents a synthesis of the findings of the Defence Academy Cyber Inquiry. The Inquiry was an open source research programme formed in response to a strategic research question posed by the Ministry...

FBI Proposal May Undermine Cybersecurity, Experts Say

The Center for Democracy and Technology posted a report from 20 of the leading experts in computer and network security criticizing the Federal Bureau of Investigation’s (FBI) proposal to require makers of secure communication tools to redesign their systems to make them wiretap compatible. Currently, the Communications Assistance for Law...

U.S. Higher Education System Fails to Prepare Leaders for Era of Cyber Threat

In a new study released March 26, 2013, the Pell Center of Salve Regina University found that the majority of America’s “top” academic institutions are failing to provide students with the knowledge and tools necessary to combat cyber threats in the professional world. The report argues that “cyber defense requires...

APT1: Exposing One of China’s Cyber Espionage Units

Mandiant, a U.S. security firm, has published a report that links “China’s military to cyberattacks on more than 140 U.S. and other foreign corporations and entities.” The report, “APT1: Exposing One of China’s Cyber Espionage Units,” is the culmination of investigations over several years which provide evidence that an Advanced...

Executive Order on Improving Critical Infrastructure Cybersecurity

Yesterday, President Obama signed an Executive Order on Improving Critical Infrastructure Cybersecurity. From the Executive Order: “Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront....

CHDS Director Ted Lewis’ Remarks on Cyber Insecurity

Last week, NPS Center for Homeland Defense and Security (CHDS) director Dr. Ted Lewis posted a blog entry, “Cyber Insecurity: Black Swan or Headline?”, onto the Homeland Security Watch blog site. The post addresses the new concept of “cyber insecurity” and its relationship to the United States’ deep-rooted “military industrial...

New Report on Emerging Cyber Threats in 2013

A new report has been released by the Georgia Institute of Technology titled “Emerging Cyber Threats Report 2013.” The report was released following the annual Georgia Tech Cyber Security Summit (GTCSS) that was held November 14, 2012. The GTCSS provides a forum which allows stakeholders to collaborate in the pursuit...

How Internet Schemes Work and the Cyber-Scammers’ Scorecard for 2011

A new report provides consumers and law enforcement not only data statistics for cyber-crime but an explanation of how each internet scam is run as well. 300,000 alleged criminal acts and attempts provide the data on which the Internet Crime Complaint Center’s (IC3) 2011 Internet Crime Report is based. Unfortunately,...

Chinese Capabilities for Computer Network Operations and Cyber Espionage

The U.S.-China Economic and Security Review Commission has received its latest report which details the capabilities and threat potential of Chinese state-sponsored cyber operations and cyber criminals originating in China. Entitled, Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage , this assessment expands upon...

DHS Blueprint for a Secure Cyber Future

The Department of Homeland Security’s (DHS) report Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise “builds on the Department of Homeland Security Quadrennial Homeland Security Review Report’s strategic framework by providing a clear path to create a safe, secure, and resilient cyber environment for...