• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER WARFARE AND HOMELAND SECURITY UPDATE

November 8, 2012 by

07 Nov 12. Cassidian CyberSecurity, a division of EADS, has been chosen by CESG (the Information Assurance arm of GCHQ) and CPNI (Centre for the Protection of National Infrastructure) as one of 4 commercial cybersecurity organisations to work with the National Authorities in the Cyber Incident Response pilot. The Cyber Incident Response scheme was launched on November 7 and commences with a pilot phase running till February 2013. The scheme will be developed to allow organisations to be certified by the UK National Authority to work on networks belonging to government and critical UK industries. The organisations will be certified largely on the basis of the competences of the teams and individuals working on these cyber security issues and tackling the effects of advanced malware attacks. These cyber attacks may include new techniques not previously seen, zero day attacks, innovative attack combinations and especially persistent threat attacks. Cassidian CyberSecurity offers a full Incident Response and Remediation support service to help organisations recover from cyber attacks, including, where it is possible, identifying stolen data and compromised assets. Cassidian CyberSecurity’s extensive experience in handling advanced persistent threat (APT) attacks and incident-response cases has built up a unique cyber intelligence capability (knowledge base of attack scenarios, attack patterns, attack trends). This credibility is recognised by the UK National Authorities and ensures Cassidian CyberSecurity’s place in shaping the way organisations will deal with the cyber threat in the future.

05 Nov 12. Lockheed Martin and its Cyber Security Alliance partners announced the results of a collaborative cyber security survey in a new white paper titled “Cyber Security and Transformational Technologies – Keeping Systems and Data Safe”. The survey found that 85% of government technology decision makers in federal, defense/military and intelligence agencies see cyber security as a high priority and currently have one or more major initiatives underway. This was followed to a lesser degree by mobile computing (39%), cloud computing (26%) and big data (27%). The white paper describes and ranks the types of security threats agencies face and recommends preparedness strategies to effectively defend against these pressures. Threats include: malware, phishing, data leaks, misuse, hacking, spam, social, insider, cyber espionage, mobile and others. While most agencies consider themselves “well prepared” to deal with security threats, they continue to invest in other new technologies because mobile device initiatives, cloud computing and big data solutions contribute to more economical and affordable approaches to sharing and storing information when compared to traditional methods that require additional cyber security measures to ensure protection. The Lockheed Martin Cyber Security Alliance commissioned government market research firm Market Connections, Inc. to conduct an online survey of U.S. federal government, defense/military and intelligence agency technology decision makers. The survey measured awareness and attitudes about cloud computing, cyber security, mobility and big data topics. Survey results reflect input from respondents in all military branches and a variety of federal, state and local government agencies. The Cyber Alliance was established in 2009 and announced with the opening of Lockheed Martin’s NexGen Cyber Innovation and Technology Center. (Source: Yahoo!/PRNewswire)

06 Nov 12. Magal Security Systems Ltd. has expanded its business proposition and will start delivering cyber protection solutions to its existing and new customers. Magal’s new solutions will monitor, detect and protect against abnormal network activity, both landline and wireless, within and close to protected sites. Magal is teaming with third party technology companies to deliver turnkey cyber security solutions for critical sites, and will offer

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    May 20, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    May 20, 2022
    Read more
  • CONTRACT NEWS IN BRIEF

    May 20, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT