Blog Posts Tagged with "Government"


I’m Mad as Hell about an Executive Order on Cybersecurity

October 07, 2012 Added by:Joel Harding

And as much as you might not care, if President Obama signs an Executive Order on cybersecurity, it will set the de facto standards that we all must live with. You’ll share the data and you’ll have to live with the standards...

Comments  (0)


Is a Communist or Totalitarian System Preferable in the Internet Age?

October 03, 2012 Added by:Doug DePeppe

In the West, we tout the openness of the Internet. Many attribute the Internet as playing a major part in the Arab Spring. The dark underbelly of the Internet, however, is that all this connectivity allows bad actors to connect to any target he desires...

Comments  (4)


The Wicked Witches of Cyberspace

September 27, 2012 Added by:Joel Harding

Lately I’ve been doing a deep dive on technologies that enable one to bypass filters, blocking and jamming, to get uncensored information into denied areas. When we use these technologies it is on behalf of goodness, apple pie and the American way. When someone else does its nefarious...

Comments  (0)


House Passes the Broad Warrantless Spying Bill

September 23, 2012 Added by:Electronic Frontier Foundation

The House voted to renew the dangerous FISA Amendment Act which hands the NSA broad, warrantless surveillance powers for another five years. Sadly, the House refused to add any oversight powers or privacy protections, despite evidence the NSA has used it to spy on Americans...

Comments  (0)


An Open Letter to Senator Rockefeller

September 20, 2012 Added by:Richard Stiennon

Like in many matters involving science and technology, scientists and technologists should be brought into future deliberations on cyber legislation. The technologists that make the Internet operate and the security experts that battle to defend it need to be brought to the table...

Comments  (0)


Creating a Surveillance-Free Internet

September 20, 2012 Added by:Electronic Frontier Foundation

Since its origins in 2008, Freedom Not Fear has developed the general message: fundamental rights like privacy, free expression, due process, and democratic participation are jeopardized when reactionary, fear-driven surveillance systems penetrate our societies...

Comments  (0)


Federal CIO Council Releases BYOD Toolkit

September 19, 2012 Added by:David Navetta

The BYOD movement, barring a black swan event, is likely to continue to gather steam – though not without detractors. And as the Toolkit notes, BYOD remains a nascent movement with real concerns and numerous issues to be worked through, along with the establishment of new practices...

Comments  (0)


There is No Need for a Cybersecurity Executive Order

September 11, 2012 Added by:Richard Stiennon

Forcing utility operators, banks, and earth resources companies to comply with frameworks based on outmoded asset and vulnerability methodologies will distract them from implementing threat based defenses. The Executive Order, if issued, will do much more harm than good...

Comments  (2)


Assessment of Security Policies Within the DoD

September 11, 2012 Added by:Stefano Mele

According to a new report from the DoD Inspector General, security policies "often overlap, are fragmentary, or inconsistent". The sheer volume of policies that are not integrated makes it difficult for those in the field to ensure consistent and comprehensive policy implementation...

Comments  (0)


How Practical is a Disconnected Network?

September 10, 2012 Added by:Rafal Los

Air-gapped networks are difficult to maintain, and what happens when you have to transfer data from that air-gapped network to somewhere else. What if you have to install printer drivers or update your anti-virus signatures? Doesn't sound so easy to do now, does it?

Comments  (2)


Congress Demands Answers for DHS Domain Name Seizures

September 10, 2012 Added by:Electronic Frontier Foundation

After a year control over was handed back to the owners with no apology and no explanation. It is disturbing enough that DHS has been acting as the tax-funded hired gun of the content industry, but, even more horrifying it censored the wrong targets for no good reason...

Comments  (0)


Research Sheds Light on New Surveillance Apps for Smartphones

September 04, 2012 Added by:Electronic Frontier Foundation

The FinSpy Mobile analysis will allow vulnerable and at-risk users to better understand the threat of government surveillance and make better judgements to protect their security and privacy. This software is sophisticated and powerful...

Comments  (0)


NSA Still Warrantlessly Wiretapping Americans

August 30, 2012 Added by:Electronic Frontier Foundation

There’s long been ample evidence the NSA has been unlawfully collecting Americans' communications since the passage of the FISA Amendments Act. As the New York Times reported in 2009, the NSA was still collecting purely domestic communications of Americans' in a "significant and systemic" way...

Comments  (0)


Strengthening Partnerships to Address Cyber Threats

August 29, 2012 Added by:Infosec Island Admin

It only takes a single infected computer to potentially infect thousands of others. Partnerships are required across all levels of government, the private sector and internationally to share information about emerging threats and how to stop them, and coordinate mitigation efforts in response to cyber incidents...

Comments  (0)


Cyberwar! Let’s Work Through This, Shall We...

August 28, 2012 Added by:Joel Harding

So what is cyberwar? Most people feel that some country is going to launch attacks against another, trying to blind their military, mute the government and make life incredibly miserable for their citizens. If the attack is successful, part of the economic base will probably be permanently destroyed...

Comments  (5)


The Poor State of Cyber Intelligence

August 23, 2012 Added by:Jeffrey Carr

The state of cyber intelligence as it is practiced by infosec professionals and others who are not trained in the science of rigorous analysis is often exponentially worse. Many analysts are missing huge gaps in the threat landscape and are doing a great disservice to their customers and their craft...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »