"Any conflict we see going forward is going to have some element of cyber warfare and we need to make sure that we've prepared and developed our military capabilities to sustain that," says Defense Deputy Secretary William Lynn III.
Defense Deputy Secretary William Lynn III briefs the media on the Department of Defense's new strategy to defend military IT networks and a 2008 incident in which an assailant breached a classified military network.
Experts tell Congress that technology to provide for perfect attribution won't be possible anytime soon. Yet if it were, the solution could raise privacy and civil liberties concerns that many Americans would find untenable.
"The strategy with TIC was to define a manageable number of access points... and then just begin reducing and consolidating the external connections to run through those access points," Fed Network Security Director Matt Coose says.
"Systems compromised by this botnet provide the attackers not only user credentials and confidential information, but remote access inside the compromised networks," says Amit Yoran, CEO of NetWitness, which revealed the Kneber attacks.
Alex Cox, Research Consultant and Principal Analyst, NetWitness
Alex Cox, a research consultant and principal analyst at the IT security firm NetWitness, discovered last month the Kneber botnet, a variant of the ZueS Trojan that he says has infested 75,000 systems in 2,500 corporate and governmental organizations...
It's hard to place a value on an intrusion detection system until you see the system in action. CIO Charles Christian at Good Samaritan Hospital in Vincennes, Ind., recently discovered just how worthwhile his intrusion detection investment really is.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.
As the federal government rolls out to its agencies the second iteration of the Einstein intrusion-detection system and readies a more advanced intrusion-prevention Einstein 2, it is partnering with Michigan in deploying the original version of Einstein. Michigan becomes the first state to employ Einstein.
The breach is the latest of many cyber assaults that have plagued the space agency, which experienced 1,200 security incidents in 2007 and 2008, resulting in the installation of malicious code and unauthorized access to sensitive information.