Tags » Cyber-warfare

The Short-Sightedness of Obama-Era Cyber Operations Policy

Look who is back … GI James … Another pitcher, wings and mozarella sticks please.

I thought the last one was off but this one is better. 251 more words

Technology

Supply-Chain Attacks: Why the U.S. Should Worry – Lawfare

Glenn Greenwald released a photograph from the Snowden documents in May 2014 showing the National Security Agency covertly installing an implant in a Cisco router intercepted during shipping. 79 more words

Technology

The Argument for a Cyber Response Playbook

With the exception of not-seen-before attacks and malware, most responses and defensive tactics and strategies are pretty standard and can be automated. DHS does have… 73 more words

Technology

On the Theft and Reuse of Advanced Offensive Cyber Weapons

Last year, North Korea and Russia used a vulnerability stolen from the U.S. government to conduct the WannaCry and NotPetya ransomware attacks.

Source: On the Theft and Reuse of Advanced Offensive Cyber Weapons

Technology

Nearly All Major Agencies Are on Governmentwide Cyber Threat Dashboard

Nice and it can also have other benefits related to technology life cycle management, procurement, costs reductions, transformation and EA. The system can also be an Achilles heel. 54 more words

Technology

Pentagon Puts Cyberwarriors on the Offensive, Increasing the Risk of Conflict

Until now, the Cyber Command has assumed a largely defensive posture, but in the spring the Defense Department opened the door to nearly daily raids on foreign networks, seeking to head off attacks. 12 more words

Technology

Why Hackers Aren’t Afraid of Us

The United States has the most fearsome cyberweaponry on the planet, but we won’t use it for fear of what will come next.

Source: Why Hackers Aren’t Afraid of Us

Technology