Categories » Cyberwarfare

Hackers Gather for Cyberwar in an Intense 48-Hour Sim

Hackers Gather for Cyberwar in an Intense 48-Hour Sim

Locked Shields is among the world’s preeminent cyber attack simulations. For two days, international teams of hackers and system admins play both sides of a war game, simultaneously attacking and defending critical infrastructure. The details are realistic, and the exercises reflect real-world geopolitics. It is a training ground for front-line operators in a rapidly evolving form of warfare in which network administrators at banks, electrical plants and government offices are as crucial to a country’s defense as uniformed troops.

The post Hackers Gather for Cyberwar in an Intense 48-Hour Sim appeared first on WIRED.



Continue reading

Army Cyber Chief: Let’s Get Closer To Industry- 11 September 2014

11 September 2014- Defense News Army Cyber Chief: Let’s Get Closer To Industry

ISIS Cyber Capability Judged More ‘Aspirational’ Than Operational- 17 September 2014

17 September 2014- FCW ISIS cyber capability judged more ‘aspirational’ than operational

Kremlin Wants to ‘Protect Russian Cyberspace from Unpredictable West’- 19 September 2014

19 September 2014- Security Week Kremlin Wants to ‘Protect Russian Cyberspace from Unpredictable West’

Hackers Penetrated Systems of Key Defense Contractors- 18 September 2014

18 September 2014- Help Net Security Hackers penetrated systems of key defense contractors

US Naval Academy Works on Accrediting Cyber Major- 8 September 2014

8 September 2014- The Washington Times US Naval Academy Works on Accrediting Cyber major

North Korea Cyber Warfare Capabilities Exposed- 2 September 2014

2 September 2014- ZDNet North Korea cyber warfare capabilities exposed

Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?- 21 August 2014

21 August 2014- CTOVision Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?

Iran’s Emergence as a Cyber Power- 20 August 2014

20 August 2014- Strategic Studies Institute Iran’s Emergence as a Cyber Power

NATO Set to Ratify Pledge on Joint Defense in Case of Major Cyberattack- 31 August 2014

31 August 2014- New York Times NATO Set to Ratify Pledge on Joint Defense in Case of Major Cyberattack

Does the White House’s Cybersecurity Czar Need to Be a Coder? He Says No.- 22 August 2014

22 August 2014- The Washington Post Does the White House’s cybersecurity czar need to be a coder? He says no.

In Supersecret Cyberwar Game, Civilian-sector Techies Pummel Active-duty Cyberwarriors- 4 August 2014

4 August 2014- Military Times In supersecret cyberwar game, civilian-sector techies pummel active-duty cyberwarriors

CIA Insider: U.S. Should Buy All Security Exploits, Then Disclose Them- 6 August 2014

6 August 2014- Wired CIA Insider: U.S. Should Buy All Security Exploits, Then Disclose Them

Dragonfly: Western Energy Companies Under Sabotage Threat- 30 June 2014

30 June 2014- Symantec Dragonfly: Western Energy Companies Under Sabotage Threat

Reexamining Article 5: NATO’s Collective Defense in Times of Cyber Threats- 13 June 2014

13 June 2014- Huffington Post Reexamining Article 5: NATO’s Collective Defense in Times of Cyber Threats

Northcom: Cyber Attack Most Serious Threat to US- 12 July 2014

12 July 2014- FlashCritic Northcom: Cyber attack most serious threat to US

NSA Picks 5 Universities to Train Future Cyberspies- 16 July 2014

16 July 2014- CBS News NSA picks 5 universities to train future cyberspies

North Korea “Doubles Cyber War Personnel- 6 July 2014

6 July 2014- Channel NewsAsia “N Korea “doubles cyber war personnel””

Anonymous-Affiliated Hackers Have Declared War on the Islamic State- 30 June 2014

30 June 2014- Vice News Anonymous-Affiliated Hackers Have Declared War on the Islamic State

Chinese Cyber Espionage: We Know the Who, How, Why, and Why it Matters–We’re Missing the What to Do- 11 June 2014

11 June 2014- Council on Foreign Relations “Chinese Cyber Espionage: We Know the Who, How, Why, and Why it Matters–We’re Missing the What to Do”