21/06/2011
GAO´s Cyber-Command Analysis

The Department of Defense (DOD) d U.S. Cyber Command to counter cyber threats, and tasked the military services with providing support. GAO examined the extent to which DOD and U.S. Cyber Command have identified for the military services the (1) roles and responsibilities, (2) command and control relationships, and (3) mission requirements and capabilities to enable them to organize, train, and equip for cyberspace operations.

20/06/2011
Ten Rules for Cyber Security

In this paper, the Author analyses the ten rules that outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security.

16/06/2011
EU prepares to set up CERT for EU Institutions

The EU institutions have taken an important step to counter the threat of cyber attacks against the EU institutions, bodies and agencies by setting up a Computer Emergency Response pre-configuration Team (CERT). The team is made up of IT security experts from the EU institutions.

10/06/2011
Cybersecurity, Innovation and the Internet Economy

Today, the Internet is again at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cyber attacks on Internet commerce, vital business sectors and government agencies have grown exponentially.

06/06/2011
Project Cyber Dawn Libya - Public Release Copy

Project Cyber Dawn Libya can help the international community to understand not only Libya’s potential to influence the balance in cyberspace, but also the physical repercussions of cyber-attacks originating from, and directed towards Libya.


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |