Digital Government
Egypt’s revolution reveals cyber policy void
Regulations are needed to provide guidance on the role commercial service providers play in digital protest movements around the globe.
Digital Government
Are we at cyber Defcon 1?
The United States must establish clear policies, procedures and doctrine for dealing with the ever increasing number of dangers and threats that exist in the cyber domain.
Digital Government
12 courses for a cyber warfare curriculum
The core curriculum for advanced cyber warfare training should include 12 educational programs that would build the skills necessary for success in the offensive, defensive and intelligence collection areas in the military and intelligence communities and in many sectors of the defense industry.
Digital Government
Cooperative mindset needed to protect infrastructure
There is a lot of talk about the need for private sector working with the government and military to protect our nation’s critical infrastructure, but little information has emerged about how this will be done.
Digital Government
Congress asks about cyber black ops
A recent written exchange between the Senate Armed Services Committee and the nominee for the Director of National Intelligence indicates the pace with which cyber warfare has progressed might already have outpaced existing policies and laws such as those requiring proper reporting of clandestine operations to Congress.
Digital Government
Hacktivism on the rise
Recent events have caused government website security professionals around the globe to brace for an increase in cyberattacks as hacktivists aim to cause widespread online disruption and get their message out.
Digital Government
Russia's move to Linux
Russian federal agencies were recently ordered to shift from proprietary operating systems to Linux. What were the motivating factors for such a decision?
Digital Government
What constitutes an act of cyber war?
The surge in cyber hostilities makes it imperative for NATO or the United Nations to establish a definition of what constitutes an act of aggression.
Digital Government
Cyber underground poses real threat to globe
The tools to carry out a cyber attack are readily available through the hidden world of the cyber underground.
Digital Government
Counterfeit hardware poses security risk
Counterfeit computer hardware poses a significant security risk to private corporations and the military.
Digital Government
Did Iran's military fall victim to a cyberattack?
Iran's air defense systems might have been attacked by a modified version of the Stuxnet worm earlier this month during an air defense exercise.
Digital Government
COTS: Now maybe a four-letter word
Software products now include code that was developed offshore and may contain malicious code that threatens U.S. critical infrastructure and mission-critical defense and intelligence systems.
Digital Government
New concerns over cyber terrorism threat
Politicians and national leaders voice concerns over cyber terrorism and and propose ways to address the threat.
Digital Government
Identifying the source of cyber attacks
One of the biggest challenges confronting the Cyber command and others involved in cybersecurity is the ability to attribute acts of cyber aggression back to the real originating source.
Digital Government
NATO mulls cyber alliance proposal
Deputy Secretary of Defense William Lynn III discussed a five-pillar strategy in late September with NATO leaders in Europe in efforts to promote joint cybersecurity initiatives
Cybersecurity
Cyber incident responders lack a shared playbook
Three existing systems fail to identify the roles, structures or processes needed for cyber incident response, writes Kevin Coleman of Technolytics Institute.
Digital Government
Stuxnet worm deemed 'best malware ever'
The highly sophisticated malware known as the Stuxnet worm operated undetected for nearly six months while carrying out its stealth attack on utility infrastructure around the globe. Read about how it was brought to bay.
Almost There!
Help us tailor content specifically for you: