America’s Department of Defense “has quietly empowered the United States Cyber Command to take a far more aggressive approach to defending the nation against cyberattacks, a shift in strategy that could increase the risk of conflict with the foreign states that sponsor malicious hacking groups,” reports the New York Times. In the spring, as the
Author: CyNetDef.org
US Army Cyber Network Defenders (MOS 25D) are the most underutilized risk mitigation assets a commander has in his arsenal when it comes to operating in cyber space. Proper 25D utilization places the cyber defense expert in a position to monitor all network and system activity on the upper TI for signs of intrusion or
We’ve all heard about the “pending” or potential for World War 3. Something think it to be sooner and others think it will come later. I think it is already upon us. Wars are typically fought in a “domain” – there are five domains: Ground, Sea, Air, Space, and Cyber Space. Cyber Space is easily the
If you are like me and you run a public-facing SSH listener you will undoubtedly start to see a ton of failed SSH login attempts in /var/log/auth.log. If you are a paranoid cyber security professional like myself, then this really irks you. If it doesn’t irk you, then it needs to irk you. While your passwords