NATO launched its largest ever multinational cyber defence exercise, “Cyber Coalition 2014” on 18 November.
The three-day training event will test the Alliance’s ability to defend its networks from the various challenges that exist when operating in the contested cyber domain.
“This exercise will test our systems to make sure that NATO keeps pace with that evolving threat and that the skills and expertise of our cyber specialists are fully up to the task,” said Ambassador Sorin Ducaru, NATO Assistant Secretary General for Emerging Security Challenges. “Among the priorities highlighted in the Enhanced NATO Policy on Cyber Defence, endorsed at the Wales Summit, is training and exercises.”
The exercise involves over 400 technical, government and cyber experts operating from dozens of locations from across the Alliance and partner nations. For the first time, representatives from academia and industry have been invited as observers. The aim of the exercise is to test the rapid sharing of information about cyber incidents. The drill will also test the ability of the participating nations to coordinate a defence against a series of targeted cyber incidents involving a NATO mission network. “The cyber threat is not just a potential threat, it is daily reality,” Mr Ducaru said. “Conflicts can be virtual but with consequences that are real and destructive.”
At the Wales NATO Summit, Allies agreed that cyber-attacks can reach a threshold that threatens national and Euro-Atlantic prosperity, security, and stability. Their impact could be as harmful to modern societies as a conventional attack.
NATO leaders also affirmed that cyber defence is part of NATO's core task of collective defence.
General Dynamics C4 Systems' Trusted Network Environment (TNE), version 11-S cyber-defense software, is now being used by the U.S
Russia and China are set to sign an international cyber security agreement in the first half of 2015, Kommersant newspaper reported citing a source familiar with the progress of negotiations. According to the report, the agreement was expected to be signed this week during a state visit to China by Russian premier Vladimir Putin
The Indian government has dedicated a budget of $16. 2 million to increase cyber security and cyber defense in the country
China is implementing stronger cybersecurity measures as cyber attacks grow more rampant and deadly. Lu Wei, minister of cyberspace, told a Beijing press conference last week that in the past month 10,000 websites had been hacked in China, 80 per cent of which were government sites
With data breaches, ransomware and cyber attacks increasing at an alarming rate worldwide, the cyber insurance market is booming as well. The costs of data breaches run in the millions and take months, if not years, to recover, repair and investigate
What perhaps explains the high civilian casualties in NATOs war against the Taliban in Afghanistan, some 750 ‘minor fighters including drug dealers figure in a ‘Kill list of the International Security Assistance Force (ISAF). The list, a part of documents obtained by whistleblower Edward Snowden and published by German magazine, Der Spigel refers to the ISAF activities in Afghanistan during 2009-11
Lockheed Martin will join EMC, Jerusalem Venture Partners (JVP) and BGN Technologies as partner in the CyberSpark Industry Initiative, a non-profit organization established to enhance government-private sector collaboration in Israel and the wider international technology community through its cyber center, based at the Advanced Technologies Park, Beer-Sheva. The CyberSpark Industry Initiative serves as a coordinating body for joint cyber industry activities with various government agencies, the Israel Defence Force (IDF) and academia
US intelligence agencies along with their British counterparts allegedly wiretap undersea cables, particularly those passing through the Strait of Hormuz into the Persian/Arabian Gulf. The cables are used by telecommunication companies like Vodafone and tapped to conduct mass surveillance programs, according to new secret documents leaked by hacker Edward Snowden
US and British intelligence agencies have been linked to Regin, a top-tier espionage tool ,indentified by Symantec, that enables stealthy surveillance. Regin was reportedly was used to spy on governments, businesses, researchers and individuals since 2008, Symantec said in its official blog post Monday
Regin, a top-tier espionage tool that enables stealthy surveillance, was used to spy on governments, businesses, researchers and individuals since 2008, Symantec said in its official blog post today. An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008
The Indian state of Goa's government websites were hacked by allegedly Palestinian hackers today. Six websites from various departments were reportedly targeted
Japan's Ruling LDP Party wants Aircraft Carrier 'Mother Ship'
Saudi Investment Agency ‘SAGIA’ To Promote Russian Civil Aircraft In Middle East...
Leonardo, ENAV Partner for Development of UAV Traffic Control System
Boeing Details Super Hornet Fighter Jet Block III Version
US Approves Sale of 12 Bell AH-1Z Attack Helicopters to Bahrain for...
Northrop Grumman To Provide Abrams M1 Eyesafe Laser Rangefinder For Morocco
Dassault to Lead Franco-German Future Combat Air System
Iranian Anti-aircraft Missiles Destroyed In Israeli F-15 Jets’ Attack On Syrian Military...
One of the most interesting exhibits at the Dubai Air show 2017 occupies a corner in the Aviation Industries Corporation...
While investigators in India are following up on the money trial in the AgustaWestland VVIP helicopter scandal, the leads as...
With over 451 submarines in service worldwide, the global market of submarines fleet is expected to surge up to $100...
Amid the proliferation of real-time data from sources such as mobile devices, web, social media, sensors, log files and transactional...
Helmets for pilots and ground troops do much more than stopping bullets
As the role of Unmanned Aerial Vehicles (UAVs) expands from traditional low-resolution reconnaissance to high-res video and infra-red besides precision-attack,...