Is the U.S. the nation most vulnerable to cyberattack? |
- Is the U.S. the nation most vulnerable to cyberattack?
- From Cyber War: The Next Threat to National Security and What to Do About It
- In cyberwar, who's in charge?
- Think tank ponders war in cyberspace
- 33% of Brits think using pirated software is acceptable
- Adobe considers changes to mitigate PDF attack
- Schmidt: Private Sector Key to Stopping Google-style Attacks
- Targeted cyberattacks test enterprise security controls
- 'Cyber War' author: U.S. needs radical changes to protect against attacks
- Quantum introduces a tape library, Cisco a new switch
- Who's responsible in the battle for Internet freedom
- Facebook takes steps to deal with gift card scams
- Maley: Here's How Firing REALLY Went Down
- Are iPhones riskier than Android, Blackberry & Nokia phones?
- Document offers gloomy view of cloud
- IBM & the Masters: Technology Sponsorship Unlike Most Others
- Securing the iPad with an iPad
Is the U.S. the nation most vulnerable to cyberattack? Posted: 07 Apr 2010 05:00 AM PDT Several nations, most prominently Russia, the People's Republic of China and North Korea, are already assembling cyber armies and attack weapons that could be used to attack other nations. Given that the United States is heavily dependent on technology for everything from computer-based banking to supply-chain tracking and air-traffic control, it's particularly vulnerable to the denial-of-service attacks, electronic jamming, data destruction and software-based disinformation tricks likely in a cyberattack. |
From Cyber War: The Next Threat to National Security and What to Do About It Posted: 07 Apr 2010 05:00 AM PDT Cyber war is not some victimless, clean, new kind of war that we should embrace. Nor is it some kind of secret weapon that we need to keep hidden from the daylight and from the public. For it is the public, the civilian population of the United States and the privately owned corporations that own and run our key national systems, that are likely to suffer in a cyber war. |
Posted: 07 Apr 2010 05:00 AM PDT When the first salvos of cyberwar are fired against the United States, the responsibility to defend the country falls to the president who, aided by advisers from the broad spectrum of government agencies and also the private sector, must feel his way along an uncertain path to decide the appropriate response. |
Think tank ponders war in cyberspace Posted: 07 Apr 2010 09:00 AM PDT |
33% of Brits think using pirated software is acceptable Posted: 07 Apr 2010 09:00 AM PDT |
Adobe considers changes to mitigate PDF attack Posted: 07 Apr 2010 09:00 AM PDT |
Schmidt: Private Sector Key to Stopping Google-style Attacks Posted: 07 Apr 2010 09:00 AM PDT |
Targeted cyberattacks test enterprise security controls Posted: 07 Apr 2010 09:00 AM PDT |
'Cyber War' author: U.S. needs radical changes to protect against attacks Posted: 07 Apr 2010 09:00 AM PDT |
Quantum introduces a tape library, Cisco a new switch Posted: 07 Apr 2010 09:00 AM PDT |
Who's responsible in the battle for Internet freedom Posted: 07 Apr 2010 09:00 AM PDT |
Facebook takes steps to deal with gift card scams Posted: 07 Apr 2010 09:00 AM PDT |
Maley: Here's How Firing REALLY Went Down Posted: 07 Apr 2010 09:00 AM PDT |
Are iPhones riskier than Android, Blackberry & Nokia phones? Posted: 06 Apr 2010 09:00 AM PDT |
Document offers gloomy view of cloud Posted: 06 Apr 2010 09:00 AM PDT |
IBM & the Masters: Technology Sponsorship Unlike Most Others Posted: 06 Apr 2010 09:00 AM PDT When viewers tune in to coverage of the 2010 Masters golf tournament, they will see IBM advertisements on the CBS and ESPN TV broadcasts and the IBM logo on the Masters.com website. Viewers will most likely hear about IBM's vision of a "smarter planet" campaign. (I always look forward to the guy who says "Smarter Stuttgart.") |
Securing the iPad with an iPad Posted: 06 Apr 2010 09:00 AM PDT Mobility management start-up MobileIron recently announced MobileIron Sentry App, a mobile security application that manages Apple iPads and other mobile devices from -- you guessed it! -- the Apple iPad itself. The new Apple tablet is another device that must be secured and managed within the enterprise, and now it can also potentially serve as the security and management console for IT personnel on the go. |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment