US launches voluntary cybersecurity plan
Posted on
DefenceTalkThe US administration on Wednesday launched a cybersecurity plan which aims to use voluntary collaboration from the private sector to protect critical infrastructure from computer hackers. The initiative stems from an executive order issued last year by President Barack Obama after repeated failures in Congress of a cybersecurity law. The so-called cybersecurity framework allows the […]https://www.defencetalk.com/us-launches-voluntary-cybersecurity-plan-50699/
Cyberspace warriors graduate with Army’s newest military occupational specialty
Posted on
DefenceTalkThe network is under attack! Cyber attacks are a daily reality and are growing in sophistication and complexity. How does the Army keep pace with this evolving threat and defend its network? Fifteen Soldiers made history when they were awarded the newest Army military occupational specialty, 25D, cyber network defender, during a graduation ceremony Nov. […]https://www.defencetalk.com/cyberspace-security-army-military-occupational-specialty-49881/
US concerned over deal by China’s Huawei in South Korea
Posted on
DefenceTalkTop US officials expressed concern Tuesday at reports that Chinese telecoms giant Huawei is set to build a new broadband network in South Korea that Washington sees as a possible spying risk. Huawei, barred from projects in the United States and Australia over national security concerns, was reportedly selected as a subcontractor for LGU+, a […]https://www.defencetalk.com/us-concerned-over-deal-by-chinas-huawei-in-south-korea-49809/
Army Looks to Blend Cyber, Electronic Warfare Capabilities On the Battlefield
Posted on
DefenceTalkAs new technologies emerge and new cyber and electronic warfare threats plague Soldiers in the field, U.S. Army scientists and engineers continue to define next-generation protocols and system architectures to help develop technology capabilities to combat these threats in an integrated and expedited fashion. As part of the Integrated Cyber and Electronic Warfare, or ICE, […]https://www.defencetalk.com/army-looks-to-blend-cyber-electronic-warfare-capabilities-on-the-battlefield-49472/
Britain may hire hackers for cyber-defence
Posted on
DefenceTalkBritain may recruit convicted computer hackers to a new military unit dedicated to combating cyber-attacks, Defence Secretary Philip Hammond said. Hammond announced plans last month to recruit hundreds of computer experts to work as military reservists for at least 19 days a year in a new Joint Cyber Reserve unit. “As a matter of policy […]https://www.defencetalk.com/britain-may-hire-hackers-for-cyber-defence-49458/
Swedish Military Want Cyber-attack Capability
Posted on
DefenceTalkThe Swedish armed forces want to build their capability to attack other countries’ computer networks. In a recent report on the long term strategic planning, the armed forces stress the need to also go on the offensive as part of the cyber defence. It is not that common to hear Sweden, with its long tradition […]https://www.defencetalk.com/swedish-military-want-cyber-attack-capability-49411/
Researchers warn of ‘hit and run’ cyber attackers
Posted on
DefenceTalkSecurity researchers said Wednesday they uncovered a “cyber mercenary” team which specializes in attacks on targets in Japan and South Korea, and warned of more operations of that nature. Kaspersky Labs identified the group as “Icefog,” and said evidence points to it being based in China. Based on the targets, the attackers appear to have […]https://www.defencetalk.com/researchers-warn-of-hit-and-run-cyber-attackers-49210/
CID cyber tips: Protecting your online identity
Posted on
DefenceTalkNow more than ever, Soldiers, Army civilians, and family members rely on the Internet to work, study, stay connected with family and friends, pay their bills or simply unwind. For criminals, the Internet provides an endless stream of potential targets to be victimized. The U.S. Army Criminal Investigation Command, commonly known as CID, continually receives […]https://www.defencetalk.com/cid-cyber-tips-protecting-your-online-identity-49123/
The Global Cybersecurity Market 2013-2023
Posted on
DefenceTalkThis report is the result of an extensive market and company research covering the global cyber security industry. It provides detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry participants, analysis of the leading companies in the industry, and key news. Introduction and Landscape Why was […]https://www.defencetalk.com/the-global-cybersecurity-market-2013-2023-48680/
China, Indonesia lead sources of online attacks: study
Posted on
DefenceTalkChina and Indonesia headed the list of 177 countries named as sources of Internet attacks, a security survey said Tuesday. The survey from US security firm Akamai found China remained at the top of the list in the first quarter of 2013, but its share of all attacks dropped to 34 percent from 41 percent […]https://www.defencetalk.com/china-indonesia-lead-sources-of-online-attacks-study-48589/