Qioptiq logo Raytheon Global MilSatCom

CYBER WARFARE AND HOMELAND SECURITY UPDATE

07 Nov 12. Cassidian CyberSecurity, a division of EADS, has been chosen by CESG (the Information Assurance arm of GCHQ) and CPNI (Centre for the Protection of National Infrastructure) as one of 4 commercial cybersecurity organisations to work with the National Authorities in the Cyber Incident Response pilot. The Cyber Incident Response scheme was launched on November 7 and commences with a pilot phase running till February 2013. The scheme will be developed to allow organisations to be certified by the UK National Authority to work on networks belonging to government and critical UK industries. The organisations will be certified largely on the basis of the competences of the teams and individuals working on these cyber security issues and tackling the effects of advanced malware attacks. These cyber attacks may include new techniques not previously seen, zero day attacks, innovative attack combinations and especially persistent threat attacks. Cassidian CyberSecurity offers a full Incident Response and Remediation support service to help organisations recover from cyber attacks, including, where it is possible, identifying stolen data and compromised assets. Cassidian CyberSecurity’s extensive experience in handling advanced persistent threat (APT) attacks and incident-response cases has built up a unique cyber intelligence capability (knowledge base of attack scenarios, attack patterns, attack trends). This credibility is recognised by the UK National Authorities and ensures Cassidian CyberSecurity’s place in shaping the way organisations will deal with the cyber threat in the future.

05 Nov 12. Lockheed Martin and its Cyber Security Alliance partners announced the results of a collaborative cyber security survey in a new white paper titled “Cyber Security and Transformational Technologies – Keeping Systems and Data Safe”. The survey found that 85% of government technology decision makers in federal, defense/military and intelligence agencies see cyber security as a high priority and currently have one or more major initiatives underway. This was followed to a lesser degree by mobile computing (39%), cloud computing (26%) and big data (27%). The white paper describes and ranks the types of security threats agencies face and recommends preparedness strategies to effectively defend against these pressures. Threats include: malware, phishing, data leaks, misuse, hacking, spam, social, insider, cyber espionage, mobile and others. While most agencies consider themselves “well prepared” to deal with security threats, they continue to invest in other new technologies because mobile device initiatives, cloud computing and big data solutions contribute to more economical and affordable approaches to sharing and storing information when compared to traditional methods that require additional cyber security measures to ensure protection. The Lockheed Martin Cyber Security Alliance commissioned government market research firm Market Connections, Inc. to conduct an online survey of U.S. federal government, defense/military and intelligence agency technology decision makers. The survey measured awareness and attitudes about cloud computing, cyber security, mobility and big data topics. Survey results reflect input from respondents in all military branches and a variety of federal, state and local government agencies. The Cyber Alliance was established in 2009 and announced with the opening of Lockheed Martin’s NexGen Cyber Innovation and Technology Center. (Source: Yahoo!/PRNewswire)

06 Nov 12. Magal Security Systems Ltd. has expanded its business proposition and will start delivering cyber protection solutions to its existing and new customers. Magal’s new solutions will monitor, detect and protect against abnormal network activity, both landline and wireless, within and close to protected sites. Magal is teaming with third party technology companies to deliver turnkey cyber security solutions for critical sites, and will offer

Back to article list