Currently viewing the category: "Cyber Warfare"

Download (PDF, 6.18MB)

2015 DoD Cyber StrategyThe Department of Defense has released its 2015 DoD Cyber Strategy in April.  It is important to understand where the 2015 DoD Cyber Strategy fits in the National Strategy for Cyberspace.  So the 2015 DoD Cyber Strategy sets out the goals the Department of Defense has been tasked to achieve in support of the National Military Strategy and National Strategy for Cyberspace.

The 2015 DoD Cyber Strategy sets five strategic goals for its cyberspace missions:

1. Build and maintain ready forces and capabilities to conduct cyberspace operations;

2. Defend the DoD information network, secure DoD data, and mitigate risks to DoD missions;

3. Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive cyberattacks of significant consequence;

4. Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environment at all stages;

5. Build and maintain robust international alliances and partnerships to deter shared threats and increase international security and stability.


Incoming search terms:

dod unfunded ort tfca, Navy greenert cyber resiliency tfca ort

Download (PDF, 5.39MB)

McAfee Threat Report February 2015This is the McAfee Threats Report February 2015 for review.  It highlights the massive mobile vulnerabilities that remain due to the SSL vulnerabilities.

About McAfee Labs McAfee Labs is one of the world’s leading sources for threat research, threat intelligence, and cybersecurity thought leadership. With data from millions of sensors across key threats vectors—file, web, message, and network—McAfee Labs delivers real-time threat intelligence, critical analysis, and expert thinking to improve protection and reduce risks.


Incoming search terms:

McAfeeThreatsReportFebruary2015-ACyberFellow, mcafee threat report, mcafee threat report 2015, mcafee threats report, mcafee threats report 2015

Download (PDF, 3.98MB)

It is important to understand what is going on within our networks. The Equation Group Kaspersky Report February 2Equation Group Kaspersky Report February 2015015 is a very interesting read.

The Equation group is a highly sophisticated threat actor that has been engaged in multiple CNE (computer network exploitation) operations dating back to 2001, and perhaps as early as 1996. The Equation group uses multiple malware platforms, some of which surpass the well-known “Regin” threat in complexity and sophistication. The Equation group is probably one of the most sophisticated cyber attack groups in the world; and they are the most advanced McAfee Threat Report February 2015threat actor we have seen.


Set your Twitter account name in your settings to use the TwitterBar Section.