via Washington Post Before the infamous leak, the 250,000 State Department cables acquired by anti-secrecy activists resided in a database so obscure that few diplomats had heard of it. It had a bureaucratic name, Net-Centric Diplomacy, and served an important mission: the rapid sharing of informati...
Posts Tagged: United States
via info security British defense firm BAE Systems has agreed to acquire ETI A/S, a Danish cybersecurity firm, for approximately $212 million. ETI, with annual sales of approximately $61 million, employs 260 people in Denmark, the UK, the US, Asia, and the Middle East. BAE Systems said the acquisiti...
“The U.S. government’s main code-making and code-cracking agency now works on the assumption that foes may have pierced even the most sensitive national security computer networks under its guard. ‘There’s no such thing as ‘secure’ any more,’ Debora Plunkett...
McDonald’s has alerted a number of its customers that their personal details might have been compromised, following a hacking exploit in the US: The data did, however, include information required to confirm age, a method of contact, such as name, mobile phone number, postal address and email ad...
The Federal Cyber landscape is driven by missions and budgets. Mission without budget is folly. Even in periods of significant downward pressure on budgets, there must be spending to ensure agencies succeed. When it comes to IT, a leading assessment indicates IT spending will actually increase...
“The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that ......
Sometimes a huge vision and fantastic goal is what is required to cause the dramatic change required in enterprises. Our vision for enterprise security: We believe enterprises, including the entire Federal IT Enterprise, can achieve an improvement in both security and functionality by two orders o...