• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER WARFARE, CLOUD COMPUTING

September 26, 2013 by

Web Page sponsored by Cassidian

www.Cassidian.com
————————————————————————-
25 Sep 13. Cyber attacks could soon threaten critical infrastructure, wearable technology and even medical implants, according to a study conducted by Europol’s European Cybercrime Centre (EC3) and the International Cyber Security Protection Alliance (ICSPA). The white paper outlines emerging threats from cloud-powered Denial-of-Service attacks and Big Data vulnerabilities to bio-hacks which beat authentication systems like fingerprint recognition. The emergence of new cyber attack exploits provide new vectors to endanger the cyber security and reputation of individuals, companies and governments alike, the study’s authors warn. The White Paper – Scenarios for the Future of Cybercrime – is the first research paper to emerge from the ICSPA’s Project 2020, which brings together the European Union’s law enforcement agency dedicated to fighting cybercrime, the European Cyber Crime Centre (EC3) and ICSPA members and partners from business, government, law enforcement and academia. The study establishes a baseline assessment of current cyber threats – from Hacktivism and social engineering to Crime-as-a-Service attacks – and outlines a range of threat scenarios for the year 2020, in a world where society and second-generation digital natives depend on the secure running of deeply embedded technologies. The study warns that it is not only personal and corporate reputations that are under threat, but that emerging technologies will “increasingly blur” the distinction between cyber and physical assaults. Attacks on augmented and virtual reality technologies, meanwhile, could result in serious “psychological harm to individuals”.

24 Sep 13. General Dynamics Fidelis Cybersecurity Solutions announced its flagship network security solution, Fidelis XPS, now includes a new application of YARA technology, a rule-based malware identification and classification tool, that will increase the real-time prevention of malware attacks by analyzing threats in network traffic. Arming customers with another innovative method to detect malicious traffic as it flows on the network, the continued enhancements to Fidelis XPS help customers reduce remediation costs by blocking malware before it enters the enterprise. Fidelis XPS leverages YARA’s capabilities of classifying detected malware and scanning static objects in a file system after they have already entered the network, to extend and support its prevention efforts to scan network sessions in progress. With organizations placing an increased focus on blocking as much malware as possible before it enters the network, this collaboration makes advanced threat defense an active component of network defense. In doing so, the costs and downtime associated with remediation after a threat has been detected can be drastically reduced.

25 Sep 13. U.S. Cyber Command has activated the headquarters for its Cyber National Mission Force, the one of its three forces that would react to a cyber attack on the nation, Army Gen. Keith B. Alexander, Cybercom’s commander, said at the National Press Club. The other two forces are the Cyber Combat Mission Force that is assigned to the operational control of individual combatant commanders, and the Cyber Protection Force that helps operate and defend the Defense Department’s information environment. Speaking at the 4th Annual Cybersecurity Summit, the general, who is also director of the National Security Agency, said Cybercom teams are now fully operational and working side by side with NSA to defend the nation.
“We will ensure that we have the best force anywhere in the world,” Alexander said. Federal, military and industry officials listened as the general detailed five aspects of cybersecurity that NSA and Cyber Command are working to improve. “Look at what’s happened in the past year,” Alexander said. “Over 300 distributed denial-of-s

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    May 20, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    May 20, 2022
    Read more
  • CONTRACT NEWS IN BRIEF

    May 20, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT