• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER WARFARE UPDATE

June 1, 2011 by

31 May 11. Jetico, developers of military-standard data protection software, has announced that their popular BestCrypt Container
Encryption software is now released for Mac users. Previously only available on Windows and Linux, Jetico’s proven file encryption software now offers full compatibility with Mac computers. “if a laptop containing confidential or personal information were to be stolen or accessed by an unauthorized person, BestCrypt offers peace of mind that any sensitive files are protected by strong encryption that’s simple to use.”Ideal for organizations or individuals that need to prevent data leakage and theft, BestCrypt Container Encryption delivers reliable data protection for sensitive or private information. Selected files and folders are automatically encrypted when stored inside BestCrypt container files which work like virtual disk drives. When the virtual disk drive is mounted or opened, you can read and write data or drag and drop files – just like you would with any regular removable disk drive. BestCrypt’s key advantage is working with container files for transfer and storage of encrypted data – compatible across Windows, Linux and Mac. Users can determine the size of the container depending upon their needs, as well as create multiple containers for more flexible data management. (Source: BUSINESS WIRE)

31 May 11. Top Pentagon contractors have been bleeding secrets for years as a result of penetrations of their computer networks, current and former national security officials say. The Defense Department, which runs its own worldwide eavesdropping, spying and code-cracking systems, says more than 100 foreign intelligence organizations have been trying to break into U.S. networks. Some of the perpetrators “already have the capacity to disrupt” U.S. information infrastructure, Deputy Defense Secretary William Lynn, who is leading remedial efforts, wrote last fall in the journal Foreign Affairs. Joel Brenner, the National Counterintelligence executive from 2006 to 2009, said most if not all of the big defense contractors’ networks had been pierced. “This has been happening since the late ’90s,” he told Reuters Tuesday. He identified the main threats as coming from Russia, China and Iran. “They’re after our weapons systems and R&D,” or research and development, said Brenner, now with the law firm of Cooley LLP in Washington. Lockheed Martin Corp, the Pentagon’s No. 1 supplier by sales, said on Saturday that it had thwarted “a significant and tenacious” attack on its information systems network that it detected May 21. Ten days later, the company says its still working to restore full employee access to the network while maintaining the highest level of security. Lockheed, which is also the government’s top information technology provider, said it had become “a frequent target of adversaries from around the world.” A spokeswoman said it said it used the term “adversaries” only in a general sense. Lockheed has not disclosed which of its business units was targeted. Cyber intruders were reported in 2009 to have broken into computers holding data on Lockheed’s projected $380bn-plus F-35 fighter program, the Pentagon’s costliest arms purchase. Other big Pentagon contractors include Boeing Co, Northrop Grumman Corp, General Dynamics Corp, BAE Systems Plc and Raytheon Co. Each of these declined to comment on whether it believed its networks had been penetrated. James Miller, the principal deputy undersecretary of defense for policy, said last May that the United States was losing terabytes of data in cyber attacks, enough to fill “multiple Libraries of Congress.” The world’s largest library, its archive totaled about 235 terabytes of data as of April, the Library of Congress says on its web site.
“The scale of compromise, including the loss of sensitive and unclassified data, is staggering,” Miller told a Washington forum.
U.S. Senator Sheldon Whitehouse, who led a Senate Intelligence Committee cyber tas

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022 GlobalMilSat

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    July 1, 2022
    Read more
  • VETERANS UPDATE

    July 1, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    July 1, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT