Bradley Manning was detained during a tour of duty in Iraq.
Google denies use of private data, Adobe warns of critical security flaw in its products
The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren\'t sure what the command is supposed to do: protect the Pentagon\'s networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.
Carnegie Mellon University\'s Computer Emergency Response Team (or CERT) has released a new fuzzing framework that will help identify and eliminate security vulnerabilities from different kinds of software. The fuzz testers are used by security researchers to find vulnerabilities by sending random input to an application. Fuzz testing has been popular among hackers, but with the release of this framework, CERT can push businesses to subject all software to fuzz testing.
Learn more in today\'s cybersecurity update.
Two cyber leaders concur on importance of moving past forensics to risk mitigation.
New Australian zombie code in effect by December
The House Cybersecurity Caucus says new provisions \"will establish strong, centralized oversight to protect our nation\'s critical information infrastructure and update our comprehensive policy for operating in cyberspace.\" But will they? We ask Jim Lewis with CSIS
Data security threats continue to increase in number and sophistication. We learn more about \'Building an Architecture of Trust\' from Don Proctor, senior vice president for cyber security at Cisco.
Gen. Keith Alexander calls for the Cyber Command to have real time understanding of what\'s going on in their computer networks. He also calls for a common operational picture as a part of improving situational awareness. Alexander also says DoD is putting a lot of effort and focus on ensuring privacy and civil liberties laws and regulations are followed.
If the 2011 defense authorization bill passes the Senate the Defense Department will get an added boost to it\'s cybersecurity portfolio. Learn more in today\'s cybersecurity update.
They\'re no longer battling your standard denial of service attacks.
Deputy Defense Secretary William Lynn\'s op-ed piece about U.S. Cyber Command.