Qioptiq logo Raytheon Global MilSatCom

CYBER WARFARE, CLOUD COMPUTING AND HOMELAND SECURITY UPDATE

Web Page sponsored by Cassidian

www.Cassidian.com

————————————————————————-
04 Sep 13. Prolinx has announced a comprehensive Cyber Assurance service to protect organisations against today’s constantly evolving barrage of cyber attacks. Prolinx has used its experience gained by working on secure military and government projects to assemble a combination of technologies and processes that offer a ‘protect, detect, react and recover’ approach to dealing with cyber crime. In addition to stopping attacks before they gain entry, Prolinx’s solution contains and isolates malicious attacks so that employees can get on with their jobs without the need to ‘lock down’ the IT infrastructure. By putting recovery procedures and workarounds in place before a cyber attack happens, businesses can quickly move forward after an attack to recover lost data or configuration information without disruption to productivity. Timely incident reports supported by RSA’s Security Analytics technology enable organisations to assess system damage or data loss, quickly resume operations, and avoid negative press. Prolinx has integrated RSA’s Security Analytics technology into its recover methodology to enable the solution to provide a fully logged attack life cycle report. By analysing log files, network traffic and threat intelligence information, Prolinx provides better visibility into security threats, which enables faster detection, documented intelligent reaction and efficient recovery without disruption to business.

31 Aug 13. NSA pays U.S. firms for communications network access. Documents offer a look at program expected to cost $278m in the current fiscal year. Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652m project has placed “covert implants,” sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions. The documents provided by Snowden and interviews with former U.S. officials describe a campaign of computer intrusions that is far broader and more aggressive than previously understood. The Obama administration treats all such cyber-operations as clandestine and declines to acknowledge them. The scope and scale of offensive operations represent an evolution in policy, which in the past sought to preserve an international norm against acts of aggression in cyberspace, in part because U.S. economic and military power depend so heavily on computers. Of the 231 offensive operations conducted in 2011, the budget said, nearly three-quarters were against top-priority targets, which former officials say includes adversaries such as Iran, Russia, China and North Korea and activities such as nuclear proliferation. The document provided few other details about the operations. Stuxnet, a computer worm reportedly developed by the United States and Israel that destroyed Iranian nuclear centrifuges in attacks in 2009 and 2010, is often cited as the most dramatic use of a cyberweapon. Experts said no other known cyberattacks carried out by the United States match the physical damage inflicted in that case. (Source: Open Source Information Report)

29 Aug 13. SecureNinja, the leading Cybersecurity training and services company in Washington, DC, Virginia and San Diego announces the opening its newest training center outside of Fort Gordon, GA. The strategic launch coincides with the US Army’s plan to consolidate cyber training into a Cyber Center of Excellence in Fort Gordon designed to “unify and modernize” all cyber-related training efforts. The Army’s restructuring plan is the first step in a detailed outline of changes that will decide where the military will live and train for years to come. Since late June, federal leaders have

Back to article list