cyber intelligence

Countries around the world have awoken to the risks of cyber attacks on their systems launched by criminals, hacktivists, terrorists and rogue nation states.

As of January 2012, we found twenty-two countries have established cyber defense centers in an effort to enhance both their offense, defensive and cyber intelligence capabilities. Keep reading →

It is hard not to notice the increase in activity and public information about cyber threats that has been in the media lately.

That concern was borne out by testimony during a Feb. 2 hearing in which the chairman of the House Intelligence Committee, Republican Mike Rogers of Michigan, warned of the severe consequences of a cyber attack on the United States. Keep reading →

Two separate but related events took place in recent days that individually were important moments in the rapid evolution of the cyber threat domain. When you combine these two events, clearly you can see their significance.

Both events serve as strong indicators of the concern over cyber attacks, as well as a barometer for the current state of digital conflict. Keep reading →

It was bound to happen and it appears it has just begun – cyber burn-out.

Recently a few security professional expressed symptoms that are associated with burn-out. This type of attitude is so uncharacteristic of these individuals. They are talking about, and more importantly, exhibiting the depletion and drain of professional drive. Keep reading →

Defense Secretary Leon Panetta has reiterated the military’s going-forward strategy on many occasions, saying about our military’s direction: “It must be complemented by the full range of America’s national security capabilities – strong intelligence, strong diplomacy, a strong economy, strong technology, developments in cyber capabilities.” These five areas comprise the new defense strategy.

Last week the web was all abuzz with coverage of President Obama’s press conference at the Pentagon along with Defense Secretary Panetta and the Chairman of the Joint Chiefs Gen. Martin Dempsey as they unveiled the administration’s new military strategy. It is clear the U.S. military will undergo dramatic changes due to budget cuts. Keep reading →

The European Network and Information Security Agency (ENISA) just released a new study this month that looks at protecting the security of industrial control (or SCADA) systems (ICS).

The study recognizes that industrial control systems are truly a strategic asset and must be protected against the rising potential of cyber terrorist attacks with Keep reading →

It is getting to the point that those reporting acts of cyber aggression, particularly in the area of cyber espionage, think they are in a repetitive do-loop. It is the same story over and over again with the only difference being the list of victims.

The news of late has been the discovery of yet another sophisticated cyber attack that resulted in the collection of untold information, some general some sensitive, from the business community as well as defense contractors and government officials. Keep reading →

Cyber intelligence has emerged as the single most critical element in cyber defense. The private sector owns and operates the vast majority of the U.S. critical infrastructure which has become a high value target for those who wish to harm the United States. In addition, the private sector produces a substantive portion of the technology used to defend the nation, which if compromised could be very damaging.

On Dec. 1, 2011 the House Permanent Select Committee on Intelligence Committee Chairman Mike Rogers introduced what is being called a ground-breaking piece of legislation. Keep reading →

COMMENTARY:
Last week yet another call was heard for the need for increased efforts to identify, collect, analyze and disseminate cyber intelligence. This latest call was the result of a recent report that warned the U.S. must develop cyber intelligence as a new and better coordinated government discipline.

How many times does this have to be recommended and justified before we just get it done and done right? Keep reading →

COMMENTARY:
Social media is perhaps the greatest tool for mass communication–and for attracting like-minded individuals. That is not new. Back in 2005, for instance, the Journal of International Security Affairs reported on the increased web presence of several major Islamic militias.

Threat intelligence analysis, however, indicates that information and activities within social networking sites is now viewed as one of the primary sources of cyber intelligence on extremist groups and terrorists. Keep reading →

Page 4 of 512345