The Department of Defense has released its 2015 DoD Cyber Strategy in April. It is important to understand where the 2015 DoD Cyber Strategy fits in the National Strategy for Cyberspace. So the 2015 DoD Cyber Strategy sets out the goals the Department of Defense has been tasked to achieve in support of the National Military Strategy and National Strategy for Cyberspace.
The 2015 DoD Cyber Strategy sets five strategic goals for its cyberspace missions:
1. Build and maintain ready forces and capabilities to conduct cyberspace operations;
2. Defend the DoD information network, secure DoD data, and mitigate risks to DoD missions;
3. Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive cyberattacks of significant consequence;
4. Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environment at all stages;
5. Build and maintain robust international alliances and partnerships to deter shared threats and increase international security and stability.
Incoming search terms:dod unfunded ort tfca, Navy greenert cyber resiliency tfca ort
This is the McAfee Threats Report February 2015 for review. It highlights the massive mobile vulnerabilities that remain due to the SSL vulnerabilities.
About McAfee Labs McAfee Labs is one of the world’s leading sources for threat research, threat intelligence, and cybersecurity thought leadership. With data from millions of sensors across key threats vectors—file, web, message, and network—McAfee Labs delivers real-time threat intelligence, critical analysis, and expert thinking to improve protection and reduce risks.
Incoming search terms:McAfeeThreatsReportFebruary2015-ACyberFellow, mcafee threat report, mcafee threat report 2015, mcafee threats report, mcafee threats report 2015
It is important to understand what is going on within our networks. The Equation Group Kaspersky Report February 2015 is a very interesting read.
The Equation group is a highly sophisticated threat actor that has been engaged in multiple CNE (computer network exploitation) operations dating back to 2001, and perhaps as early as 1996. The Equation group uses multiple malware platforms, some of which surpass the well-known “Regin” threat in complexity and sophistication. The Equation group is probably one of the most sophisticated cyber attack groups in the world; and they are the most advanced McAfee Threat Report February 2015threat actor we have seen.
Follow A Cyber Fellow on Twitter!
Fake EFF Site Used in Spear Phishing Campaign http://t.co/5ltveZ8H91
IBM’s Dr. John Kelly Is Bringing Watson To Disrupt SF |… http://t.co/MXsYhuLUF1
DARPA wants to launch and land Gremlins on moving planes http://t.co/QsHBw7Egh8