Attacks against those fake IP addresses allowed internal cyber defense operatives to discern when they were being actively targeted.
Their CERTs are evolving to what I call Cyber Defense Teams.
FORBES: In Cyber, Losers Ignore, Survivors React, and Winners Predict
It's telling that the U.S. doesn't have a publicly stated doctrine on cyber defense that warns enemies and commits to taking action in response.
We need to build on the efforts of the NATO Cooperative Cyber Defense Center of Excellence, based in Tallinn, Estonia, which conducts research, training and regular exercises to test the rapid-response capabilities of allied cyber-units.
The prosecution responded with a declaration from Crutchfield that outlined Bishop's work in cyber defense, a position he held from May 2011 until his arrest, and his previous job helping develop Pacific Command strategy and policy.
If one quarter of enterprises are engaging in this type of activity we have truly entered a new era of cyber defense that will entail the creation of new services and products to feed the demand: products that focus on identifying attack methodologies and thwarting them.
FORBES: Is Your IT Posture That Of A Protector, Detective, or Warrior?
Senators worried the new position of overseeing the military's cyber defense efforts for the Pentagon could blur the lines between Alexander's current civilian role of leading the National Security Agency (NSA), which also plays a role in protecting the nations computer networks by monitoring domestic electronic communications.
At present, the billions of dollars spent on some of the intelligence and defense cyber programs are in direct competition for the already scarce resources with those defending enterprise networks.
FORBES: Cyberwar Or Not Cyberwar? And Why That Is The Question
Hoss is that rare combination of technical expert -- from cyber to missile defense -- and strategic thinker, whether it was updating our nuclear posture or preparing our military for 21st-century missions.
WHITEHOUSE: President Obama Makes Defense Personnel Announcements
Carter said the budget reductions would have a devastating effect on a number of Pentagon programs, but continued investment in offensive and defense cyber operations would continue, along with unmanned systems, space capabilities and electronic warfare.
Another discussant suggested getting back to the core duty of collective security, including cyber security and missile defense.
FORBES: NATO's Lack Of Any Serious Purpose Means It Should Retire
Still, the shield's effectiveness as a defense in cyber-warfare is far from clear: Bruce Schneier, the founder and chief technology officer of security firm BT Counterpane, argues that no single strategy can stop determined hackers.
The offense, the cyber-criminals, has essentially outpaced the defense, which is why there are so many high profile cyber-attacks.
Second, there is the fact that too many players are crowding into the handful of growth opportunities in defense such as cyber-security for anyone to make a killing.
FORBES: After Bin Laden, What Next For The Defense Industry?
We believe that KEYW Holding has significant growth opportunities going forward from the incremental U.S. defense spending on cyber security (9.1% annual growth rate through 2015) and geospatial technologies.
In fact, DefCon's species of armchair hackers are more of a distraction for law enforcement than a real menace, says Jim Christy, director of future exploration at the Department of Defense's Cyber Crime Center.
Similarly, a good cyber strategy will require a balance of offense and defense and, most importantly, a clear vision for how cyber power relates to and can work in concert with other types of power to meet military objectives and promote national interests.
FORBES: DOD Cyber Strategy Remains Ambiguous on Threats and Responses
Finally, in a recent post on his blog, Sam Liles, an associate professor at the National Defense University, takes cyber strategists to task for focusing too much on the technological infrastructure of cyberspace and not enough on the social and cognitive aspects.
"A cyber attack against a government agency or a defense contractor is an attack against our nation, " said Sen.
Officials should be aware that in the past several years insurance companies have begun to market specific computer policies that may provide first and third-party coverage for losses associated with cyber incidents, such as costs for data restoration, crisis response, privacy notification and forensic investigation, as well as defense and indemnification arising out of cyber incidents, and business interruption.
FORBES: Disclosing Cyber Security Incidents: The SEC Weighs In
America, according to Secretary of Defense Leon Panetta is at severe risk from cyber-attack, and DHS has indicated that we are short at least 30, 000 security professionals.
FORBES: Japanese Secret Boxes: The Coolest Security Puzzles for Kids and Adults
The problem that forward thinkers on cyber security like Kendall, Alexander, and former deputy defense secretary Bill Lynn face is that the existing information grid and acquisition system have spawned constituencies with deep roots in the political system.
FORBES: Pentagon Tech Chief Points To Big Problem In Protecting Networks
Last month, the Defense Department announced it is establishing a series of cyber teams charged with carrying out offensive operations to combat threats of cyberattacks aimed at disrupting the country's vital infrastructure.
The thinking was that cyber threats would keep proliferating for the foreseeable future, and defense companies were more likely to have the necessary clearances and market knowledge to compete in cyberwarfare than outsiders like Google or Microsoft.
FORBES: Cyberwarfare May Be A Bust For Many Defense Contractors
In addition, Dr. Leitner is a Professor with the National Center for Biodefense at George Mason University as well as a Senior Fellow and Professor with the Center for Advanced Defense Studies responsible for Terrorism, Intelligence, and Cyber War issues.
CENTERFORSECURITYPOLICY: Peter Leitner on Somali Pirates, Shariah & the DHS Report
Finally, James Lewis, a leading cybersecurity expert at the Center for Strategic and International Studies, has recently said that an October 2012 speech on cybersecurity by Secretary of Defense Leon Panetta indicates that the Department of Defense is effectively taking over U.S. cyber security.
Unfortunately, his presentation only added to the ongoing ambiguity surrounding the existence and scale of the supposed cyber threat facing the United States in general, and the Department of Defense (DoD) in particular.
FORBES: Just How Big Is The Cyber Threat To The Department Of Defense?
Likewise, if Kelley were charging cyber harassment under Florida state law, says Leslie Sammis, a criminal defense lawyer in Tampa, she would only have to show that the emails caused her emotional distress.
FORBES: Was There Illegal Cyberstalking In The Petraeus Affair?
Most obvious is that they are being used by Administration officials like Secretary of Defense Leon Panetta to make the case for a possible executive order on cyber security, as well as to argue in favor of cyber security legislation.
FORBES: Anonymous Sources Provide No Evidence of Iran Cyber Attacks
Cyber attacks and the genetic engineering of dangerous viruses may require similarly focused, comprehensive approaches to defense.
应用推荐