COMPUTER NETWORK DEFENSE

Type: Keyphrase
Name: COMPUTER NETWORK DEFENSE
First reported Oct 16 2014 - Updated Oct 16 2014 - 1 reports

NCDOC officer receives Vice Adm. Richard W. Mayo award

Suffolk -- Lt. Cmdr. Scott F. Cole of Navy Cyber Defense Operations Command (NCDOC), Suffolk, was the recent recipient of the 2013 Vice Adm. Richard W. Mayo Award.The prestigious Mayo Award, named for the first commander of Naval Network Warfare Command, ... [Published Norfolk Navy Flagship - Oct 16 2014]
First reported Oct 15 2014 - Updated Oct 15 2014 - 1 reports

Global CyberLympics champions announced at ISACA conference in Barcelona

Cybersecurity professionals from across the globe came together to compete in the World Finals of the Global CyberLympics held on September 29 2014 at ISACA ’s EuroCACS/Information Security and Risk Management Conference in Barcelona, Spain.Cybersecurity ... [Published Government Security News - Oct 15 2014]
First reported Oct 14 2014 - Updated Oct 14 2014 - 1 reports

NSA Agents Physically Infiltrated Communication Companies from China, Germany and South Korea

The latest Snowden leaked documents revealed that the NSA has physically infiltrated and compromised devices and networks from communication companies within China, Germany and South Korea during their “physical subversion” programs. The Intercept ... [Published HOTforSecurity - Oct 14 2014]
First reported Oct 13 2014 - Updated Oct 13 2014 - 1 reports

NSA’s “Core Secrets” suggests agents inside firms in US, abroad

The U.S. National Security Agency has worked with companies to weaken encryption products at the same time it infiltrated firms to gain access to sensitive systems, according to a purportedly leaked classified document outlined in an article on The Intercept ... [Published ArsTechnica - Oct 13 2014]
First reported Oct 12 2014 - Updated Oct 13 2014 - 1 reports

Core Secrets: NSA Saboteurs in China and Germany

The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by  The Intercept .The documents, leaked ... [Published ZNet - Oct 12 2014]
First reported Oct 11 2014 - Updated Oct 12 2014 - 1 reports

NSA Agents Infiltrate Companies in Germany, China

The National Security Agency has been a busy bee and it seems that it has agents infiltrated into China, South Korea and even Germany, where they work on programs using “physical subversion” to infiltrate and compromise networks and devices.The Intercept ... [Published Softpedia - Oct 11 2014]
First reported Oct 10 2014 - Updated Oct 10 2014 - 1 reports

NATIONAL SECURITY : Congressman Langevin to Address Cybercrime as Part of URI Honors Colloquium, Oct 21

KINGSTON, R.I. , Oct. 9 -- The University of Rhode Island issued the following news release:Congressman Jim Langevin will headline a panel on Cybercrime at the University of Rhode Island Honors Colloquium , Tuesday, Oct. 21 at 7:30 p.m.The free public ... [Published 4 Traders - Oct 10 2014]
First reported Oct 04 2014 - Updated Oct 04 2014 - 1 reports

Patent Issued for Systems and Methods for Implementing and Scoring Computer Network Defense Exercises

By a News Reporter-Staff News Editor at Bioterrorism Week -- Leidos, Inc. ( Reston, VA ) has been issued patent number 8844044, according to news reporting originating out of Alexandria, Virginia , by NewsRx editors (see also Leidos, Inc. ).The patent's ... [Published 4 Traders - Oct 04 2014]
First reported Oct 01 2014 - Updated Oct 01 2014 - 1 reports

New MITRE Book Outlines Ten Proven Strategies for Computer Network Defense

Best Practices Apply to Government, Industry, Academia and Nonprofit Sector ... [Published Marketwire - Breaking News Releases - Oct 01 2014]
First reported Sep 23 2014 - Updated Sep 23 2014 - 1 reports

Systems and methods for implementing and scoring computer network defense exercises

A process for facilitating a client system defense training exercise implemented over a client-server architecture includes designated modules and hardware for protocol version identification message; registration; profiling; health reporting; vulnerability ... [Published Free Patents Online - Sep 23 2014]
First reported Jun 03 2014 - Updated Jun 03 2014 - 2 reports

Introducing the Digital Security Strategy Series

This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community … Continue reading → ... [Published Security Bloggers Network - Jun 03 2014]
First reported Jun 02 2014 - Updated Jun 02 2014 - 1 reports

On the Twenty Years Since My USAFA Graduation

Twenty years ago today, on 1 June 1994, 1024 of us graduated from the United States Air Force Academy , commissioned as brand new second lieutenants. As of September 2012, over 600 members of the class of 1994 were still in uniform. I expect that ... [Published TaoSecurity - Jun 02 2014]

Quotes

The Intercept  claims the document states  "The facts contained in [the Sentry Eagle] program constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS’s overall cryptologic mission."
From the background information supplied by the inventors, news correspondents obtained the following quote: "Embodiments of the invention relate to computer security. Specific embodiments relate to training information technology (IT) staff in the attack and/or defense of computer systems and networks."
"ICF is pleased to continue to provide this valuable service to the U S Army Research Laboratory and to help research and develop next-generation tools and techniques that defend against the growing attacks on networks and data" said Bill Christman, vice president for ICF International

More Content

All (19) | News (11) | Reports (0) | Blogs (8) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
NCDOC officer receives Vice Adm. Richard W. May... [Published Norfolk Navy Flagship - Oct 16 2014]
Global CyberLympics champions announced at ISAC... [Published Government Security News - Oct 15 2014]
NSA Agents Physically Infiltrated Communication... [Published HOTforSecurity - Oct 14 2014]
NSA Has Used Covert Operatives in Foreign Compa... [Published AllGov - Oct 13 2014]
NSA’s “Core Secrets” suggests agents inside fir... [Published ArsTechnica - Oct 13 2014]
Core Secrets: NSA Saboteurs in China and Germany [Published ZNet - Oct 12 2014]
NSA Agents Infiltrate Companies in Germany, China [Published Softpedia - Oct 11 2014]
NATIONAL SECURITY : Congressman Langevin to Add... [Published 4 Traders - Oct 10 2014]
Patent Issued for Systems and Methods for Imple... [Published 4 Traders - Oct 04 2014]
New MITRE Book Outlines Ten Proven Strategies f... [Published Marketwire - Breaking News Releases - Oct 01 2014]
Systems and methods for implementing and scorin... [Published Free Patents Online - Sep 23 2014]
Introducing the Digital Security Strategy Series [Published Security Bloggers Network - Jun 03 2014]
Introducing the Digital Security Strategy Series [Published FireEye Blog - Jun 03 2014]
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
ICF International providing services to Army to... [Published News About Cyber Warfare - May 30 2014]
ShowMeCon 2014 - Hacking To Get Caught: A Conce... [Published SecurityTube.Net - May 09 2014]
Book Review: Secrets and Lies: Digital Security... [Published Security Bloggers Network - May 05 2014]
Global CyberLympics, the International Cybersec... [Published PRWeb - May 05 2014]
EC-Council, creator of the world famous Certifi... [Published PRWeb - Feb 24 2014]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
NSA Agents Physically Infiltrated Communication... [Published HOTforSecurity - Oct 14 2014]
The latest Snowden leaked documents revealed that the NSA has physically infiltrated and compromised devices and networks from communication companies within China, Germany and South Korea during their “physical subversion” programs. The Intercept ...
New MITRE Book Outlines Ten Proven Strategies f... [Published Marketwire - Breaking News Releases - Oct 01 2014]
Best Practices Apply to Government, Industry, Academia and Nonprofit Sector ...
Introducing the Digital Security Strategy Series [Published Security Bloggers Network - Jun 03 2014]
This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community … Continue reading → ...
Introducing the Digital Security Strategy Series [Published FireEye Blog - Jun 03 2014]
This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community is dominated by discussions ...
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
Twenty years ago today, on 1 June 1994, 1024 of us graduated from the United States Air Force Academy , commissioned as brand new second lieutenants. As of September 2012, over 600 members of the class of 1994 were still in uniform. I expect that ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.