Dr. Allan Friedman is Director of Cybersecurity Initiatives at the National Telecommunications and Information Administration in the US Department of Commerce. He coordinates NTIA’s multi-stakeholder processes on cybersecurity, focusing on addressing vulnerabilities in connected systems and across the software world. Prior to joining the Federal Government,
Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks. It involves both offensive and defensive operations pertaining to the threat of cyberattacks, espionage and sabotage. There has been controversy over whether such operations can be called "war". Nevertheless, powers have been developing cyber capabilities and engaged in cyberwarfare, both offensively and defensively.
Dr. Joshua Alton Sipper is currently assigned to the Air Force Cyber College as a Professor of Cyberwarfare Studies. He completed his Doctoral work at Trident University in September of 2012, earning a Ph.D. in Educational Leadership (emphasis, E-Learning Leadership). Dr. Sipper’s previous degrees were obtained from Troy University (M.Ed. Education) and
Intelligence fuels an organization’s ability to stay ahead of the next threat while enabling the business to make informed decisions. A successful threat intelligence program contextualizes threat data, aligns intelligence with business objectives, and then builds processes to satisfy those objectives. As technology evolves, threat actors will inevitably
Holly Dragoo is a research associate with the Advanced Concepts Laboratory at the Georgia Tech Research Institute. Her previous work with the U.S. Department of Defense and Federal Bureau of Investigation give her a unique understanding of cybernetwork intrusions and intelligence analysis. Her research interests include cyberwarfare policy issues, threat
The Department of Homeland Security on Monday issued guidance to U.S. companies and government agencies on securing their computer networks following the killing last week of a top Iranian general.
A junior Marine got his artillery unit into a serious bind after snapping a photo during a massive force-on-force training exercise in California's Mojave Desert.
Security analysts from IBM recently discovered a data-wiping malware dubbed as ZeroCleare.
If "mutually assured cyber destruction" were to occur, one Marine Corps leader said, authoritarian nations such as China might have more to lose than the United States.
Defending in cyberspace is only half the battle. Making it clear to adversaries that the United States is capable of engaging in damaging cyberattacks of its own is a way of deterring adversaries from acting in the first place, a senior Defense Department official told lawmakers on Capitol Hill.
Eight of the world's biggest technology service providers were hacked by Chinese cyber spies in an elaborate and years-long invasion, Reuters found. The invasion exploited weaknesses in those companies, their customers, and the Western system of technological defense.