09/01/2012
Problems with extending EINSTEIN 3 to Critical Infrastructure

In an effort to protect its computer systems from malevolent actors, the U.S. government has developed a series of intrusion-detection and intrusion-prevention systems aimed at monitoring and screening traffic between the internet and government systems.
With EINSTEIN 3, the government now may seek to do the same for private critical infrastructure networks.

30/12/2011
A Cyberworm that Knows no Boundaries

This paper explores the implications of Stuxnet-like worms for the United States and specifically for the U.S. Department of Defense. It discusses what makes cyber defense difficult and outlines the bureaucratic and legal issues and boundaries in the United States that can compound the problem. It then offers some conclusions and recommendations for how the United States can confront the increasing risk posed by such threats.

28/12/2011
China’s Cyber Command

An interesting article in China Defense Daily lays out the China´s point of view about the characteristics necessary for “a highly effective command system for cyber war mobilization”.

20/12/2011
ENISA EU-Report on Maritime Cyber Security

ENISA has published the first EU report ever on cyber security challenges in the Maritime Sector.

14/12/2011
Congress Authorizes Offensive Military Action in Cyberspace

The Congress has given the U.S. military a "green light" to conduct offensive military activities in cyberspace.


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |