Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: cyber warfare
Over the course of our cyber warfare reports, we've provided you with an understanding of the growing dangers of cyber threats. Hi, I'm Darrell Covell, CTO & Founder of Rsignia. These Cyber Thugs steal our nation's secretes and your personal information for personal gain.
Intrusion detection systems are ubiquitous defenses in today's networks. Fast Capture of traffic and analysis is crucial to dealing with intrusions. Research has proven that ever increasing traffic loads on today's networks has opened a security hole in our defenses. While operating under heavy loads, many of the currently deployed IDS's cannot cope with the onslaught. Rather than simply slowing down, some of these systems actually begin skipping packets, allowing long streams of traffic to pass through uninspected.
The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. The revelations follow a recent Wall Street Journal report that computers used to control the U.S. electrical-distribution system, as well as other infrastructure, have also been infiltrated by spies abroad. Attacks like these have escalated. Military, civilian, and private companies are affected.
Vice Admiral Nancy Brown
Director, C4 Systems
Joint Staff, DoD
February 17th, 2009
The Pentagon is finalizing a new cyber warfighting strategy that will create a framework for training and equipping forces.
Security experts say a treaty that to create international cybersecurity rules might not be attainable.
The U.S. isn't the only country preparing for a future cyber attack.
Learn more in today's cybersecurity update.
With federal dollars just now becoming available and new federal appropriations legislation, federal agencies will be even more time-pressed to spend their budget dollars before the end of the fiscal year. On a bipartisan basis, Congress increased cyber security spending to ensure the rebuilding of aging network infrastructure to better prepare for possible disasters and future cyber threats that now occur on a daily basis.
In a recent cyber security survey of government IT executives, intrusion detection and prevention were one of the top priorities mentioned by 42% of the respondents in that survey. Investments in intrusion detection to protect the network and prevent intrusions were indicated to be extremely important. Securing your network in these two areas to protect against cyber attacks will have an indelible impact on improving security.