U.S. Cyber Command

The push to adopt continuous monitoring as a more advanced means for ensuring network security can only work if other network technologies are made secure, said a leading computer scientist from the National Institute of Standards and Technology.

Agencies need to understand the underlying security issues, beyond what continuous monitoring can offer, because adversaries can take advantage of weaknesses to bring down network capabilities, said Ron Ross, senior computer scientist and fellow at NIST. Ross (pictured above, seated far left) made the remarks at the recent Symantec Government Symposium on government security practices. Keep reading →

For several days, Bank of America’s systems had problems. The problems – primarily denial of service disruptions – hit their web site and reportedly their mobile banking services.

For BofA, the nation’s largest bank based on assets, this was not the first issue or attack they experienced in the past year. Nor in fact, was BofA the only U.S. financial institution that has been experiencing what appears to be a series of directed cyber attacks. JPMorgan Chase and Citigroup also are reported to have been struck by similar related aggressive cyber activities, beginning last year. Keep reading →

Army Maj.Gen. Mark Bowman, Joint Chiefs of Staff CIO.

The U.S. military operates many of the world’s largest and most complex computer and communications networks, giving the Defense Department extraordinary capability and flexibility to conduct a vast assortment of global operations, from direct combat to humanitarian missions. Keep reading →

Few people would dispute that the United States is in the cross-hairs when it comes to cyber attacks. After all, the U.S. is the country that is the most dependent on the Internet as a component of our critical infrastructure.

Cyber attacks on our critical infrastructure have evolved over the years and pose a substantial threat that should concern everyone. Keep reading →

The spirit of necessity has taken hold and U.S. Cyber Command, the National Security Agency (NSA) and even the Department of Homeland Security (DHS) along with the office of the Director of National Intelligence (ODNI) are sharing cyber intelligence with critical infrastructure providers and technology companies in the private sector.

Of course this is done on a case by case basis and there clearly needs to be an identified threat and of course a need to know. Keep reading →