18 Feb 2019

Cyber blitzkrieg replaces cyber Pearl Harbor

Greg Austin, one of Australia’s top cyber strategists, believes that major cyber powers like the US, China and Russia have begun to think about cyberwar in a different way. While in the past the focus was on developing “policies, processes, and procedures for identifying and responding to a multi-sector cyber attack

Read More
15 Feb 2019

How Cyber Command’s plan to ‘frustrate’ hackers is working

According to a recent testimony by the head of U.S. Cyber Command before the Senate Armed Services Committee, the organization has been increasing its cyber operations across the globe with success, guided by the philosophy of ‘defending forward.’ “In practice, this means confronting our adversaries from where they launch cyberattacks and

Read More
14 Feb 2019

What the Pentagon’s new AI strategy means for cybersecurity

On February 12, the US Department of Defense (DoD) released its new artificial intelligence (AI) strategy, which outlines plans for the integration of machine learning in the military’s defensive cyber operations. The strategy mentions that “in order to ensure DoD AI systems are safe, secure, and robust,” the pentagon “will fund

Read More
13 Feb 2019

Why it’s time to make cybersecurity a national priority

In order for the United States to become a dominant cybersecurity force, cybersecurity needs to be made a national priority, according to Eric Trexler, vice president of global governments and critical infrastructure at Forcepoint. Trexler believes that just like America won the space race through a massive national effort, the US

Read More
13 Feb 2019

Pentagon to funnel tens of millions into cyber training for American soldiers

The US government is financing significant expansions of its cyber training facilities for American soldiers. The Pentagon will allocate millions of dollars to various plans that seem in line with the military’s increased focus on offensive hacking operations. Last week, thee solicitations were released by the US army outlining expansions

Read More
07 Feb 2019

Which Countries Have the Worst and Best Cybersecurity?

A new study by Comparitech ranking the cybersecurity performance of 60 countries, shows that there is no clear top performer and that there is ample room for improvement everywhere. The study looked at a wide variety of categories, including mobile and computer malware infections, cyberattack preparedness and cybersecurity legislation. In

Read More
31 Jan 2019

Surprising ways the government shutdown actually boosted federal cybersecurity

According to a new study by Security Scorecard, the U.S. government shutdown may not have been as bad in terms of cyber security as industry experts have been claiming. The research found improvements in terms of endpoint security and patch management during the 35-day partial shutdown. The improvements were mostly due

Read More
28 Jan 2019

The Pentagon’s Cybersecurity Is Falling Behind

The latest annual report by the U.S. Defense Department’s test and evaluation office warns that while the cyberdefense capabilities of the U.S. military are advancing, “the rate of these improvements is not outpacing the growing capabilities of potential adversaries who continue to find new vulnerabilities and techniques to counter fixes.” In

Read More
23 Jan 2019

DHS releases emergency order to prevent DNS hijacking

On Tuesday afternoon, the Department of Homeland Security ordered federal agencies to implement a variety of security measures aimed at preventing DNS hijacking attacks. As part of such attacks, threat actors target the domain name system (DNS) infrastructure that plays an essential role in directing Internet traffic, in order to redirect

Read More
17 Jan 2019

Hackers breach and steal data from South Korea’s Defense Ministry

South Korea’s Defense Acquisition Program Administration (DAPA), which is the country’s national defense agency in charge of managing arms procurement for the military, has experienced a cyberattack. The attack took place in October of last year, and resulted in the compromise of 30 DAPA computers by unidentified hackers, who managed

Read More