Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 164

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 167

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 170

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 173

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 176

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 178

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 180

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 202

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 206

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 224

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 225

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 227

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 56

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 49
21 | October | 2011 | Certified Ethical Hackers Security Analyst Malware Hacking Information
From the daily archives: Friday, October 21, 2011

Do you remember when IDS was dead, and supposed to be replaced by “thought-leading firewalls” by 2005?

Well, that prediction died pretty quickly. However, I expect to hear it again after reading DIB cybersecurity pilot has stopped ‘hundreds’ of intrusions, says Lynn:

About 20 companies participate in the Defense Department’s 90-day pilot for an active network defense capability for the defense industrial base analogous to the Homeland Security Department’s Einstein 3 effort, said Deputy Defense Secretary William Lynn.

During an address to the 2011 DISA Customer and Industry Forum in Baltimore, Md., Lynn said the sharing of malicious code signatures gathered through intelligence efforts to pilot participants has already stopped “hundreds of intrusions.”

Lynn also laid blame for intrusions into military and defense industrial base networks on “foreign intelligence services,” stating that they have stolen military plans, weapons system designs, source code and other intellectual property.

“This kind of cyber exploitation does not have the dramatic impact of a conventional military attack,” Lynn said. “But over the long term, it has a deeply corrosive effect. It blunts our edge in military technology and saps our competitiveness in the global economy.”

Foreign intruders have extracted terabytes of data from defense companies, he added.

This sort of story is likely to lead to the same arguments I heard eight years ago regarding “Intrusion Detection Systems” vs “Intrusion Prevention Systems,” namely:

If you can detect it, why can’t you prevent it?

This is a broad topic, so rather than try to answer everything here and now, I’ll likely work on it over the coming weeks in individual posts.

Article source: http://taosecurity.blogspot.com/2011/08/expect-to-hear-ids-is-dead-again.html

Tagged with:
 

Props to LS for pointing me to this WSJ article titled China’s Threat to World Order. I found the following pertinent for the “cyber” aspect:

Allegations that the Chinese government is behind the largest computer hacking operation in history will not come as a surprise to observers of recent trends in international relations. If there is one thing that China’s actions across a range of fields have made clear, it is that Beijing will do whatever it takes to advance its narrowly defined economic interests, even if that requires riding roughshod over global norms…

It is no longer acceptable for China to claim global leadership in some areas but then pretend it is a weak developing country and shirk its responsibilities in others. A China that leads the world in the theft of intellectual property, computer hacking and resource nationalism will prove extremely destabilizing. If it continues on this course, Beijing should not be surprised if other countries begin to band together to collectively counter some of the more harmful implications of China’s rise.

I think contrasting China with Russia may be helpful here. We tend to have more cooperation with Russia, even in areas of digital security; for example, see the work of the EastWest Institute.

After publishing the WSJ article, Jaime then summarized open reporting on China’s activities over the last few years and published the result at China and Cyber-Espionage.

Article source: http://taosecurity.blogspot.com/2011/08/jaime-metzl-describes-chinas-threat-to.html

Tagged with:
 
Set your Twitter account name in your settings to use the TwitterBar Section.