The Wayback Machine - https://web.archive.org/web/20171220132138/http://govit.sys-con.com:80/category/1461

Welcome!


Cyberterrorism

With Cloud Expo New York | 12th Cloud Expo [June 10-13, 2013] starting next week, here's a look at one of the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference coming up June 10-13 at the Jacob Javits Center in New Yor...
There are several certainties in computer security. One is that when adversaries have intent they will always find a way to get what they want. Another certainty is that leadership in government and industry is quick to forget the lessons learned in cyber security, especially those dea...
US Defense Secretary Leon Panetta said in a speech in New York City that America is facing a cyber Pearl Harbor that could result in the death of civilians and paralyze the country, scaring everybody out of their wits. He’s thinking about hacks on critical infrastructure, energy g...

  Here is today’s federal cybersecurity and information technology news:   The Wiper malware that hit Iran’s oil industry in the spring shares some characteristics with Stuxnet and DuQu which may link it to the U.S. and Israel. More here. Google, Amazon, and ot...

Here is today’s federal cybersecurity and information technology news: U.S. Cyber Command recently conducted a tactical-level exercise called Cyber Guard where it collaborated with subject matter experts from the National Security Agency, the National Guard, the Department of ...

Cyber attacks on government systems are increasing at an exponential rate. Over a three-year period, government agencies reported a 400-percent increase in attempted incursions into federal systems. While there is no current data on the number of attempts to compromise intelligence and...

Here is today’s federal cybersecurity and information technology news: The Department of Defense has released its Cloud Computing Strategy for transitioning to cloud services. More here. The Department of Homeland Security is exploring biometrics such as iris and facial scans ...

Cybercrime has taken a dangerous turn heralding the emergence of a new generation of attacks focused on corporate and government espionage. These attacks are targeted and persistent leading to leakage of vital state secrets and critical corporate data. These threats have been labeled a...
Maybe I’ll start doing an ‘Infographic Friday’ to go along with Lori’s F5 Friday.  This one comes to us from  Rasmussen College’s School of Technology and Design Cyber Security Program and shows the online risks and offers some good tips on how to better protect your co...

Here is today’s federal cybersecurity and information technology news: IBM and the Lawrence Livermore National Laboratory are working together on the Vulcan supercomputer to analyze data for developing new technologies in applied energy, green energy, manufacturing, data manag...

This post is co-written by AdamElkus and Alex Olesker. Before we begin, please understand just how hard it is for us to write this blog. I’ve read Neuromancer countless times, enthusiastically used Snow Crash in undergrad to talk about the future of international relations, an...

The New York Times revealed June 1st what many experts had already asserted regarding the United States role in the Stuxnet attack. While speculation of U.S. involvement complicated international relations on cyber conflict, an acknowledgement of U.S. involvement in a forum such as ...

Today’s federal cybersecurity and information technology news: The U.S. Office of Naval Research is partnering with Chilean scientists to develop a mobile application to provide information helpful in countering pirates, arms traffickers, and illegal fishermen. More here. The Arm...
On 11 June 2012 the Cyber Physical Systems Virtual Organization will be holding a symposium on Moving Target Research. In this context, think of Moving Target as meaning the creation of a dynamic attack surface to adversaries done in a way that dramatically increases the work factor re...
This week Ustream gets an injection of political reality, Apple fixes a critical encryption blunder affecting some of its users, FBI documents are leaked detailing their worries over Bitcoin digital currency, and Anonymous takes down more Governmental websites as part of its ongoing op...
Here are today’s federal cybersecurity and information technology news: The Missile Defense Agency has issued a request for proposals for a new methods to identify counterfeit electronics. More here. The Federal Bureau warns travelers not to update software on hotel wireless netw...
Today’s federal cybersecurity and information technology news round-up: The proposed Social Networking Online Protection Act (SNOPA) would make it illegal for employers to demand access rto social media accounts. More here. The Defense Advanced Research Projects Agency has reques...
Today’s federal cybersecurity and information technology news: The White House has threatened to veto the Cyber Intelligence Sharing and Protection Act (CISPA) if it reaches the President in its current form. More here. The Office of Management and Budget agrees, asking President...
Editor’s note: This post by Sean Lawson provides context on cyber conflict, an area of interest at the nexus of national security and technology. – bg Recently, Dr. Thomas Rid of the War Studies department of King’s College in London published an article in the Journa...
Today’s federal cybersecurity and IT news: Maj. Gen. Suzanne Vautrinot, commander the 24th Air Force and Air Force’s Cyber Air Component to USCYBERCOM emphasized the importance of “full-spectrum” cybersecurity that prepares for offense, defense and exploitation....
NASA was hacked 13 times last year, resulting in major breaches of sensitive government data. Hackers working from Chinese IP addresses gained full access to NASA’s files, employee credentials and system logs. Unencrypted laptops were also stolen containing codes for controlling the In...
Linode Hacked, Bitcoins Stolen: Linode.com, popular provider of virtual private servers (VPS) systems responded to a morning breach of it’s control panel software, which apparently enabled a malicious attacker to gain control over several virtual servers of a bitcoin service named Bitc...
The 1980s Marine Corps doctrine of Maneuver Warfare (MW) heavily focused on the concept of “surfaces and gaps.” Marines, which largely defined themselves with frontal tactical and operational attacks against fortified sites in World War II maritime campaigns, would aim to m...
"Security officers and professionals now must figure out how to address the new security challenges that arise as hundreds or thousands of ... new devices and their associated applications are introduced into the enterprise infrastructure," said Patricia Titus, chief information securi...
As with any effective entity within the federal realm, the DoD in its effort to ensure that mission critical information is accessible, discernible, implicitly clear for its end-users and available as demanded in an efficient manner; has implemented a technical architectural approach w...
Continued lapses in network security are holding back more activities being conducted online, poor security leads to distrust and this stifles adoption of technological change. If cyber security is better designed it will increase user certainty and it will result in greater use of the...
Roger Thompson, Chief Research Officer for AVG, who leads a global team of security researchers, blogged earlier today abiot how a U.S. Treasury site had been hacked and were reaching out to an attack site in Ukraine. The websites involved were bep.gov (Bureau of Engraving and Printing...
Right before Christmas, the White House tapped Microsoft’s long-ago chief security officer, the CEO of the non-profit Information Security Forum Howard Schmidt as head of US cyber security. Despite the national priority, between pressure from US companies and reported infighting am...

Last night Twitter.com was hacked by a group purportedly titled the Iranian Cyber Army, at least that is what people think based on the fact that this group advertised they were responsible by displaying a redirected web page with an Iranian flag and text that takes credit, saying "...

A year and a half ago I pulled together several thoughts on Cyber Deterrence which had come out of years of dialog on the cyber threat. I wanted to capture some key challenges since in my view many were making foolish assumptions regarding what our nation should do in the domain of cyb...
In the post-9/11 world, Susan Brenner worries about nontraditional warfare waged by terrorists using computers as weapons. Brenner, who's conducted cybercrimes training for the U.S. Secret Service and spoken at numerous national and international conferences, predicts cyberspace will b...