Kevin G. Coleman

Lately, the most common question I get when doing briefings and presentations about the growing threat of cyber attacks is: What is the answer?

I have been giving that a fair amount of thought and have solicited input from others who are active in the field and have a good understanding of the current state of this threat. So I am going to try and address this question for the first time publicly. Keep reading →

The implications of cyber attacks are getting more and more attention as of late and for good reason. Last week at the Government Security Conference, Gordon Snow the assistant director of the FBI’s Cyber Division added to the many reasons for concern.

In his comments Snow acknowledged concerns over cyber attacks that target the E-911 systems and the entire emergency first responder infrastructure. While these potential targets have been a concern for years, recent concerns about multi-modal cyber attack by terrorist have heightened concerns. Keep reading →

Cyber Sit-ins, cyber protests and other forms of demonstration have grown year after year and are now considered formidable method of protests.

How to respond to those new forms of protests, amid other cybersecurity threats, has become a challenge around the world for government elections, politicians, corporations, law enforcement organizations all of which have experienced the wrath of those who oppose their actions. Keep reading →

Earlier this year Iran’s President Mahmoud Ahmadinejad announced that Iran would establish a Supreme Council of Cyberspace. This was the latest action intended to strengthen Iran’s cyber power and defend the country against cyber attacks.

Sources inside of Iran have said that the council will be comprised of high-ranking Iranian officials such as the Iran’s Parliament speaker, Judiciary chief, head of the Islamic Republic of Iran Broadcasting, and ministers of Communication and Information Technology, Culture and Islamic Guidance and Intelligence. Keep reading →

It appears that all the expert cyber threat warnings and media coverage–and now a realistic cyber attack simulation on New York’s power grid–has gotten the attention of Washington.

In the latest example, according to an account published March 8 by Politico, Homeland Security Secretary Janet Napolitano and White House counterterrorism adviser John Brennan, during a classified briefing in the Office of Senate Security, showed lawmakers how a hacker could breach control systems of New York City’s electric system and trigger a ripple effect throughout the population and private sector. Keep reading →

It is hard not to notice the increase in activity and public information about cyber threats that has been in the media lately.

That concern was borne out by testimony during a Feb. 2 hearing in which the chairman of the House Intelligence Committee, Republican Mike Rogers of Michigan, warned of the severe consequences of a cyber attack on the United States. Keep reading →

Two separate but related events took place in recent days that individually were important moments in the rapid evolution of the cyber threat domain. When you combine these two events, clearly you can see their significance.

Both events serve as strong indicators of the concern over cyber attacks, as well as a barometer for the current state of digital conflict. Keep reading →

A relatively new report on the extent to which foreign spies are stealing U.S. economic secrets is gaining attention not only for what it concludes but also for the fact that it actually names names.

The report comes by way of the Office of the National Counter Intelligence Executive and is titled Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009 – 2011. Keep reading →

The European Network and Information Security Agency (ENISA) just released a new study this month that looks at protecting the security of industrial control (or SCADA) systems (ICS).

The study recognizes that industrial control systems are truly a strategic asset and must be protected against the rising potential of cyber terrorist attacks with Keep reading →

It is getting to the point that those reporting acts of cyber aggression, particularly in the area of cyber espionage, think they are in a repetitive do-loop. It is the same story over and over again with the only difference being the list of victims.

The news of late has been the discovery of yet another sophisticated cyber attack that resulted in the collection of untold information, some general some sensitive, from the business community as well as defense contractors and government officials. Keep reading →

Page 3 of 41234