America’s Department of Defense “has quietly empowered the United States Cyber Command to take a far more aggressive approach to defending the nation against cyberattacks, a shift in strategy that could increase the risk of conflict with the foreign states that sponsor malicious hacking groups,” reports the New York Times. In the spring, as the
Category: Defense
US Army Cyber Network Defenders (MOS 25D) are the most underutilized risk mitigation assets a commander has in his arsenal when it comes to operating in cyber space. Proper 25D utilization places the cyber defense expert in a position to monitor all network and system activity on the upper TI for signs of intrusion or
If you are like me and you run a public-facing SSH listener you will undoubtedly start to see a ton of failed SSH login attempts in /var/log/auth.log. If you are a paranoid cyber security professional like myself, then this really irks you. If it doesn’t irk you, then it needs to irk you. While your passwords