cybersecurity

The U.S. Defense Department has accelerated its efforts to develop offensive cyber weapons that could be used to dismantle hostile military networks in countries where U.S. forces are operating, The Washington Post reported today.

The report cites the Pentagon’s growing frustration with the military’s inability to disable enemy air defense systems and other military communications networks in places like Libya, where U.S. pilots flew combat missions to protect civilian populations from attacks by the Libyan army. That frustration has reportedly led to a five-year, $500 million budget infusion for the Defense Advanced Research Projects Agency (DARPA), the Pentagon’s main research and development organization, to fast track research into offensive cyber tools. Keep reading →

Earlier this year Iran’s President Mahmoud Ahmadinejad announced that Iran would establish a Supreme Council of Cyberspace. This was the latest action intended to strengthen Iran’s cyber power and defend the country against cyber attacks.

Sources inside of Iran have said that the council will be comprised of high-ranking Iranian officials such as the Iran’s Parliament speaker, Judiciary chief, head of the Islamic Republic of Iran Broadcasting, and ministers of Communication and Information Technology, Culture and Islamic Guidance and Intelligence. Keep reading →


Gen. Keith B. Alexander, Commander, U.S. Cyber Command and Director, National Security Agency/Chief Central Security Service shares insights on leading for success in the mobile frontier and amid the rapid evolution of technologies and threats:

__________________________________________________ Keep reading →

The Stuxnet computer worm that damaged Iranian nuclear facilities – widely suspected to be an Israeli or even U.S. covert action – was a model of a responsibly conducted cyber-attack, said the top lawyer for the U.S. military’s Cyber Command, Air Force Col. Gary Brown. By contrast, the Chinese stance, which holds that the international law of armed conflict does not apply in cyberspace, opens the door for indiscriminate online actions launched with less concern for collateral damage than was evident in Stuxnet, he warned, while a joint Russo-Chinese proposal for international collaboration on cyber-security could potentially threaten free speech.

Brown emphasized that his remarks represented his own opinion and that he was not speaking for the U.S. government, but they still open a window into the thinking of an influential official on the cutting edge of policymaking on cyber war. Keep reading →

For those tasked with managing risk throughout the enterprise, and who follow my blog postings, you’re familiar with a theme I stress often regarding information security best practices: “An ounce of prevention is worth a pound of cure.”

For practitioners and managers tasked with enterprise risk management, you can apply this approach to all your decision-making, whether you’re looking to make new technology purchases, implement new policies, and, perhaps most importantly, hiring new people. Keep reading →


In honor of Women’s History Month, Breaking Gov highlights women’s relatively recent breakthrough in the growing and increasingly crucial world of federal IT. This is the first of a three-part series on women in federal IT that reveals who these leaders are and how they’re making a difference.

Just 15 years ago, women were the exception in federal IT roles. In fact, at the time, men claimed every top federal technology job in government. Keep reading →

It appears that all the expert cyber threat warnings and media coverage–and now a realistic cyber attack simulation on New York’s power grid–has gotten the attention of Washington.

In the latest example, according to an account published March 8 by Politico, Homeland Security Secretary Janet Napolitano and White House counterterrorism adviser John Brennan, during a classified briefing in the Office of Senate Security, showed lawmakers how a hacker could breach control systems of New York City’s electric system and trigger a ripple effect throughout the population and private sector. Keep reading →

Nearly 300 government, health and education IT officials trekked to the 10th annual Public Sector CIO Summit in Redmond, Wash., last week sponsored by Microsoft. For those who couldn’t make the trip, Breaking Gov sat down with Greg Myers, who heads Microsoft‘s federal business, to get his read on what agency officials are asking for most – and what he thought were the highlights for federal IT officers at this year’s summit.

Myers, a former Oracle and BearingPoint executive who joined Microsoft in 2009, spoke with Breaking Gov Editorial Director, Wyatt Kash, about the coming merger of IT and telecommunications, the growing importance of cross platform eDiscovery, what’s ahead in cloud computing and mobility, and what federal officials can expect from Windows 8, Skype, and other Microsoft products. Keep reading →


When Susan Lawrence quit her waitressing job in her hometown of Ida Grove, Iowa, to enlist in the Army, smart phones and network-centric warfare were not part of the common vernacular.

Lawrence enlisted in what was then the Women’s Army Corps one week after her 18th birthday, specializing in home economics, typing and shorthand. Today, Lawrence is a lieutenant general and chief information officer of the Army overseeing a $10 billion information technology budget. Keep reading →

Acts of cyber aggression on governments and businesses are now considered a top risk globally. Earlier this year the World Economic Forum (WEF) released their 2012 report on Global Risks. That report looked at fifty areas of risk across specific domains such as the economy, the environment, geopolitics, society and technology.

Five of the top ten risks, however, were closely if not directly related to the cyber domain and cybersecurity concerns. Among them: Keep reading →

Page 14 of 291...101112131415161718...29