cybersecurity   7531

« earlier    

Cyber Force Fights Training Shortfalls: NSA, IONs, & RIOT « Breaking Defense - Defense industry news, analysis and commentary
three critical specialties on a team:

1) tool developers, who write the customized code — often exquisitely tailored to the specific target — required for cyber warfare;
2) exploitation analysts, who look at the intelligence on a target network and figure out how best to attack it; and
3) Interactive On-Net (ION) operators, who probe hostile, friendly, and neutral networks for weak points.

Pentagon’s created a Cyber Excepted Service that frees them from many of the usual civil service constraints and provides an ever-growing array of incentives, including greater pay for higher skill
cybercom  nsa  cybersecurity  military  disa 
yesterday by bwiese
Know Your Enemy: Lockheed Touts ‘Intelligence-Driven’ Cybersecurity « Breaking Defense - Defense industry news, analysis and commentary
increasing attacks on its 16,000 suppliers and contractors, seeking an indirect route to the prime contractor and the government itself. There are legal limits on discussing contracts with third parties, and subcontractors often dislike disclosing who their sub-sub-contractors are, lest the prime contractor decide to cut out the middleman. But Lockheed and the Pentagon are working to add clauses to contracts that would give the government, if not Lockheed, full visibility into every part of the supply chain.

not just analysts but in-house coders to write new tools as needed, reverse-engineering specialists to take apart the attacking code, and infrastructure experts who help run Lockheed’s vast networks, all sitting side by side to ease collaboration.

most valuable asset in this cyber fight is a trained warrior.
lockheedmartin  cybersecurity  supplychain  cyberkillchain  career 
yesterday by bwiese
How On-Site Security Can Benefit Your Business
Many businesses are having discussions about cybersecurity and keeping your data and finances protected. Read on to discover the benefits of providing on-site security for your business.
security  business  cybersecurity 
2 days ago by Adventure_Web
Facebook’s ex-security chief is starting an institute to tackle tech’s biggest threats - The Verge Oct 2018
Alex Stamos, Facebook’s ex-chief security officer, ... is launching a new institute he’s calling the Stanford Internet Observatory.
TheVerge  Facebook  cybersecurity  Stanford 
2 days ago by pierredv
Twitter
RT : Excited to announce I signed a book deal. Expected release date Summer 2019
CyberWarfare  cybersecurity  from twitter_favs
2 days ago by TomRaftery
Twitter
RT : The Cyentia Library - a free catalogue of industry reports - just doubled in size and now contains o…
cybersecurity  from twitter
2 days ago by versus
Twitter
“Call for Papers” is now open for CPX 360 2019. Share your how-to’s, successes, and te…
CyberSecurity  from twitter
3 days ago by phoneboy
Twitter
super cool to share our Security Design principles w/ a great crowd during their mont…
UX  Cybersecurity  from twitter_favs
4 days ago by wilbur
U.K. Cyber Security Center Says Most Attacks Are From Hostile States - Bloomberg Oct 2018
"The U.K.’s National Cyber Security Centre blamed hostile foreign states for the majority of the 1,167 attacks it has handled in the two years it’s been running, equivalent to 10 assaults a week."

"As fifth generation or 5G telephone networks come into service, companies should examine their supply chains, which may be at greater risk of hacking, the report recommended."
Bloomberg  UK  cybersecurity  vulnerability  5G 
4 days ago by pierredv

« earlier    

related tags

000  10  341webmgmt  500  5g  accounting  ad  add  agriculture  ai  amazon  apple  attribution  authentication  aws  azure  backdoor  barackobama  best  bloomberg  bruce-schneier  business  businessweek  byod  career  cdx  charlesliang  china-cyber-attacks  china  chinesehacking  cia  cis3360  cis4615  ciso  compression  computers  computing  cop4600  cors  could  course  crime  cryptography  ctf  currentawareness  cyber  cyberattacks  cyberbullying  cybercom  cybercrime  cyberkillchain  cyberwar  cyberwarfare  ddos  dell  developers  devops  dhs  digitalforensics  digitalskills  digitaltrasformation  digitimes  disa  dns  download  drac  drones  edtech  electronics  elemental  email  eubudget  exploit  facebook  fbi  finance  firefox  firmware  forensics  forensicschallenge  fraud  gcdigital  gdpr  germany  global/intl  globalzation-cons  government  grandideastudio  hacking  hardware  history  horrorstories  howto  hpc  http  https  huawei  humor  hw  incidentresponse  industry  infoblox  infosec  insiderthreat  intelligence  internal_control  internet  internetofthings  javascript  jobs  joefitzpatrick  joegrand  jordanrobertson  jpeg  k12  k12cybersecure  kernel  law  learning  linux  lockheedmartin  mac  malware  manufacturing  maps  michaelriley  microsoft  military  ml  monktoberfest  motherboard  network  networking  news  nsa  nyc  of  online  orgbehavior  osint  p25  passwords  pathdependence  pcap  pentesting  peoplesliberationarmy  perryhayes  plans  politics  polyglot  public-safety  push  qtel  readlater  redteam  reference  reliability  sanjose  security  socialengineering  socialmedia  society  software  spectrum  spying  ssl  stanford  stingray  supermicro  supplychain  surveillance  sygnia  tech  technology  temasekholding  that  theverge  threats  tls  tmt  to  tools  topsylabs  trade-global  training  trapper  tutorial  uas  uav  uk  usa  utm  ux  via-diigo  via-ifttt  via-pocket  video  vm  vpns  vulnerabilities  vulnerability  warns  whatsapp  windows  wsj  zeroday  zte 

Copy this bookmark:



description:


tags: