Columns

CYBERCOM

// by Homeland Security Today

What is the Impact of a Shutdown on the Cyber World?

A partial government shutdown is entering its third day on Monday after lawmakers were unable to reach a deal on a short-term funding bill. The House passed a month-long continuing resolution to fund the government, but Senate Democrats opposed the measure, holding out for a fix to protect so-called Dreamers, young immigrants brought to the country… Keep Reading

// by Homeland Security Today

Researchers Find Denial-of-Service Attacks Mounted Through Acoustic Signals

A group of Princeton and Purdue researchers has shown that it’s possible to mount a denial-of-service (DoS) attack against hard disk drives via acoustic signals. Hard disk drives (HDDs) have become the most commonly-used type of non-volatile storage due to their increased reliability, fault tolerance, storage capacity, and so on. “These technological advances in HDDs,… Keep Reading

Placeholder
// by Homeland Security Today

Cybersecurity Takes Pages from Swiss Bank Playbook

Criminal hackers aren’t the only cybersecurity threat American companies are worried about. Edward Snowden’s disclosures regarding National Security Agency (NSA) spying on ordinary citizens, coupled with governmental pressure on private-sector companies to hand over customer data and modifytheir systems to provide backdoor access for government officials, have made many businesses nervous. Not only would such… Keep Reading

Placeholder
// by Homeland Security Today

EXCLUSIVE: Cyber Threat Hunting: Eight Considerations for a More Proactive Approach to Cyber Defense

Both government and commercial organizations have traditionally taken a reactive approach to cybersecurity through continuous monitoring of intrusion detection and prevention systems and monitoring of cyber alert systems such as Security Information and Event Management (SIEM) systems. Although powerful, these tools can leave cyber professionals and the organizations they are defending with a false sense… Keep Reading

Placeholder
// by Homeland Security Today

Compliance Mandates Can Stifle Effective Security

Effective security is not the same thing as complying with security rules and regulations. Sure, there is a certain amount of overlap: Deliberately violating security requirements often results in poor security. But from a vulnerability assessor perspective, a good rule of thumb is that at least a third of security rules and regulations in large… Keep Reading

// by Homeland Security Today

Cyberspace Serves as a Reflective Deterrence Tool

Throughout the Cold War, robust and resilient nuclearforces prevented a nuclear catastrophe. The so-called triad of forces based on land, air and sea ensured neither side could guarantee to eliminate all of their adversary’s nuclear capability in a single strike. Today that idea lives on in the emerging military capabilities of India and China. Both… Keep Reading

1 2 3 5
Go to Top
X
X