Digital Government

Egypt’s revolution reveals cyber policy void

Regulations are needed to provide guidance on the role commercial service providers play in digital protest movements around the globe.

Digital Government

Are we at cyber Defcon 1?

The United States must establish clear policies, procedures and doctrine for dealing with the ever increasing number of dangers and threats that exist in the cyber domain.

Digital Government

12 courses for a cyber warfare curriculum

The core curriculum for advanced cyber warfare training should include 12 educational programs that would build the skills necessary for success in the offensive, defensive and intelligence collection areas in the military and intelligence communities and in many sectors of the defense industry.

Digital Government

Cooperative mindset needed to protect infrastructure

There is a lot of talk about the need for private sector working with the government and military to protect our nation’s critical infrastructure, but little information has emerged about how this will be done.

Digital Government

Congress asks about cyber black ops

A recent written exchange between the Senate Armed Services Committee and the nominee for the Director of National Intelligence indicates the pace with which cyber warfare has progressed might already have outpaced existing policies and laws such as those requiring proper reporting of clandestine operations to Congress.

Digital Government

Hacktivism on the rise

Recent events have caused government website security professionals around the globe to brace for an increase in cyberattacks as hacktivists aim to cause widespread online disruption and get their message out.

Digital Government

Russia's move to Linux

Russian federal agencies were recently ordered to shift from proprietary operating systems to Linux. What were the motivating factors for such a decision?

Digital Government

What constitutes an act of cyber war?

The surge in cyber hostilities makes it imperative for NATO or the United Nations to establish a definition of what constitutes an act of aggression.

Digital Government

Cyber underground poses real threat to globe

The tools to carry out a cyber attack are readily available through the hidden world of the cyber underground.

Digital Government

Counterfeit hardware poses security risk

Counterfeit computer hardware poses a significant security risk to private corporations and the military.

Digital Government

Did Iran's military fall victim to a cyberattack?

Iran's air defense systems might have been attacked by a modified version of the Stuxnet worm earlier this month during an air defense exercise.

Digital Government

COTS: Now maybe a four-letter word

Software products now include code that was developed offshore and may contain malicious code that threatens U.S. critical infrastructure and mission-critical defense and intelligence systems.

Digital Government

New concerns over cyber terrorism threat

Politicians and national leaders voice concerns over cyber terrorism and and propose ways to address the threat.

Digital Government

Identifying the source of cyber attacks

One of the biggest challenges confronting the Cyber command and others involved in cybersecurity is the ability to attribute acts of cyber aggression back to the real originating source.

Digital Government

NATO mulls cyber alliance proposal

Deputy Secretary of Defense William Lynn III discussed a five-pillar strategy in late September with NATO leaders in Europe in efforts to promote joint cybersecurity initiatives

Cybersecurity

Cyber incident responders lack a shared playbook

Three existing systems fail to identify the roles, structures or processes needed for cyber incident response, writes Kevin Coleman of Technolytics Institute.

Digital Government

Stuxnet worm deemed 'best malware ever'

The highly sophisticated malware known as the Stuxnet worm operated undetected for nearly six months while carrying out its stealth attack on utility infrastructure around the globe. Read about how it was brought to bay.