Title: Fortifying Your Cybersecurity Front Line: Internet-Based Threats *Network Perimeter* Proactive Best Practices Date: June 18, 2009 Time: 8:00am – 11:00am Cost: FREE Location: The Willard Hotel Washington, DC Melissa Hathaway, Acting Senior Director for Cyberspace, National Security and Homeland Security Councils, will kick off the morning with a keynote address on “The Front Line...Read More
WSJ.com Mobile Reader user [email protected] wanted you to see this: “INFORMATION WARFARE: The Mirm College Alumni Society – Strategy Page” INFORMATION WARFARE: The Mirm College Alumni SocietyStrategy PageNorth Korea probably has a unit devoted to Internet based warfare. But we know that North Korea has a lot of military units that are competent, in the...Read More
WSJ.com Mobile Reader user [email protected] wanted you to see this: “Judge Blocks Move to Prosecute Craigslist” Law Reading this on your Blackberry? Try the WSJ.com Mobile Reader now by clicking http://wsjmobilereader.com.Read More
Headlines Cyber-crime Swedish Man Indicted in 2004 Cisco Code Theft (IDG News Service, 05/05/2009) Swedish Hacker Indicted for Computer Break-Ins (NewsFactor, 05/06/2009) Cyber-security Coordinated Efforts Needed to Fight Cyberattacks (Federal Computer Week, 05/06/2009) Adversaries only need a computer and an Internet connection to launch cyberattacks that damage government systems and steal data, said Eric Cole,...Read More
Everyone, Please see my article that will be published in the Summer volume of IAnewsletter, which is a leading DoD Journal on Information Security and Assurance. The article discusses the latest U.S. government initiatives to overhaul Cyber security. It also gives President Obama kudos for making Cyber Security and Warfare a major priority- even during...Read More
Recent Comments