• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • cyber security

    Rough Week for Cybersecurity

    Cyber attacks can come from anywhere: a global power like China, weak and non-state actors, states like Iran or Syria, or even individual cyber criminals. And the government agencies responsible for defending the nation’s cyberspace cannot even prevent breaches and attacks into their own systems. The Department of Defense (DOD) … More

    Heritage's Carafano Chosen for South by Southwest (SXSW) Conference

    Heritage’s James Carafano, Vice President for Foreign and Defense Policy Studies, has been chosen to speak on cybersecurity and cyber warfare at the acclaimed South by Southwest (SXSW) Interactive Conference in Austin, Texas in early 2014. SXSW is the premier tech and social media event in the country, where thousands … More

    South by Southwest: Cybersecurity Speaker Needs Your Votes

    South by Southwest (SXSW) is the premier tech and social media event in the country. Each year, thousands of people descend on Austin, Texas, to convene for a two-week conference covering a variety of new technology and ideas in the tech space. And when it comes to technology, what could … More

    The U.S.–Russia Cybersecurity Pact: Just Paper

    The U.S. and Russia announced the completion of a joint cybersecurity agreement, two years in the making, intended to promote international peace and security and improve cyber relations between the two countries. The agreement, however, amounts to little more than a piece of paper, as such policies will scarcely improve … More

    Iranians May Be Doling Out Payback for U.S. Sanctions

    This past week, the Financial Services Information Sharing and Analysis Center raised the cyber threat level from elevated to high, and warned banks of “recent credible intelligence” of possible cyber attacks to bring down their customer sites. The Financial Sector is constantly under attack, but it is normally from criminals. … More

    Newest Hacker Target: Larger Systems That Run Everything Else

    The “systems that control our systems” are now among the most lucrative targets for hackers. Control systems are the computer programs that run and manage other computer programs. They manage water treatment plants, they run the D.C. Metro system, and they run the multitude of systems in hospitals. About a … More

    Let the User Beware: You're Responsible for Your Cybersecurity

    It is said that a wise man learns from the mistakes of others. If that is the case, the U.S. would be wise to learn from the scary story of Mat Honan, a senior writer at the technology news publication Wired. Honan is a technologically savvy guy, but with only … More

    The President Shouldn't Override the Congress on Cybersecurity

    The attempt to pass a comprehensive cybersecurity bill before the summer recess failed today in the Senate, 52–46. The Cybersecurity Act of 2012 was still not ready for prime time, despite several tries at moderating its more objectionable aspects. With this vote, cybersecurity legislation is not likely to move any … More

    Senate Cybersecurity Bill Gets Worse the More You Read It

    There will likely be a vote in the near future on the Cybersecurity Act of 2012 (CSA), led by sponsors Senators Joe Lieberman (I–CT) and Susan Collins (R–ME). As the Senate considers the CSA, it should pay close attention to the deficiencies of the bill. Indeed, as one digs deeper … More

    Cybersecurity Legislation Should Be Done Well or Not at All

    Cybersecurity legislation will likely be taken up by the Senate tomorrow. Regrettably, the idea that we just need to do something about cybersecurity seems to be trumping the view that we need to do it right. The Cybersecurity Act of 2012 (CSA), authored by Senators Joseph Lieberman (I–CT) and Susan … More