• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER WARFARE, CLOUD COMPUTING AND HOMELAND SECURITY UPDATE

August 16, 2013 by

13 Aug 13. Venezuela is seeking assistance from Brazil to enhance its cyber defence capabilities following a series of hacking attempts against government networks during the country’s last presidential election. Venezuelan Minister of Defence Carmen Melendez met with her Brazilian counterpart, Celso Amorim, on 8 August to discuss possible co-operation. Melendez said Venezuela is interested to learn from recent Brazilian experience in setting up its Cyber Defense Center (CDCiber) to protect its communications networks during a series of high-profile events. A Venezuelan delegation accompanied Melendez to Brazil to continue work on Latin America’s multinational UNASUR basic training aircraft. She also visited the state-owned EMGEPRON shipyard, where Venezuelan patrol vessel PC-22 Warao is undergoing repairs. (Source: Jane’s)

13 Aug 13. Surprisingly, sorting out the rules connected with all-out cyber war has picked up considerable steam. A little more than a month ago, a gathering of officials from more than a dozen countries including China and Russia agreed to apply international law on warfare to cyber. But coming to agreement on the more pervasive threat — constant cyber intrusions emanating from China — is proving far more challenging. Even defining the difference between intrusion and attack gets thorny. It’s one of the areas playing a key role in the ongoing dialogue between the two countries on the issue, an issue that contains definitional disagreements, cultural standards, and even technical ambiguity.
“It’s not always clear,” said Christopher Painter, US State Department cyber coordinator and chair of the cyber dialogue with China. “The two major threat concerns that we’re facing right now, there are three but two are realized, the other being this cyber war hypothetical. The two that are realized are things like denial of service attacks. That’s sustained but it’s not going to be debilitating. But that’s an attack. But you don’t use the attack term for an intrusion. It’s not an attack, it’s an intrusion. We always try to be very precise.” (Source: Defense News)

13 Aug 13. Companies ‘critical’ to UK to receive support against cybercrime. Companies deemed critical to the UK’s infrastructure are to receive support in preventing and combating serious cyber attacks from a new service that combines industry expertise with the services of British eavesdropping agency GCHQ. Two separate cyber incident response units launched on Tuesday reflect the security services’ growing anxiety about state-sponsored cyber attacks against British companies. Jonathan Evans, former head of MI5, last year told an audience in the City of London that his officers were discovering “industrial-scale processes involving many thousands of people lying behind both state-sponsored cyber espionage and organised cybercrime”. One of the schemes will inform companies, public sector bodies and universities about general practice in how to respond to an attack, while another group will engage directly with “sophisticated, targeted attacks” against UK networks as they happen. Chloë Smith, minister for cybersecurity, said British organisations were being confronted with increasingly numerous and complicated cyber threats. “The best defence for organisations is to have processes and measures in place to prevent attacks getting through, but we also have to recognise that there will be times when attacks do penetrate our systems and organisations want to know who they can reliably turn to for help,” Ms Smith said. The information-sharing initiative is backed by the security industry trade body, the Council of Registered Ethical Security Testers (Crest). (Source: FT.com)

08 Aug 13. Even as they analyze and respond to operational cyber threats on a day-to-day basis, officials at the Homeland Security Department’s National Cybersecurity and Communications Integration Center (NCCIC) say they’re working to build concrete plans that public and private se

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • PARLIAMENTARY QUESTIONS

    May 26, 2022
    Read more
  • EXHIBITIONS AND CONFERENCES

    May 20, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    May 20, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT