• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • information sharing

    Cyber Attacks: Hopping the "Great Firewall"

    Google’s new Digital Attack Map reveals that the U.S. experiences daily cyber attacks. Though much of the map’s real-time cyber activity is untraceable, the map does confirm that China heavily targets the U.S. This underscores the need for the U.S. to make China feel a cost for its cyber espionage … More

    “Voluntary” Cybersecurity Standards: The Threat of Regulation Looms

    Recently, Federal News Radio reported that the National Institute of Standards and Technology (NIST) is nearing completion of the nation’s first ever cybersecurity framework. Despite initial cooperation, the threat of mandatory regulations as a result of this framework is a sword hanging over the private sector. The NIST framework is … More

    Syria and Iran Could Retaliate with Cyber Attacks

    With the U.S. and allies actively considering military action against the Syrian regime for reportedly using chemical weapons, the U.S. cannot ignore the possibility that Syria, and its ally Iran, will strike back at the U.S. with cyber weapons. Reuters is reporting that if the U.S. does intervene in Syria, … More

    Confronting Chinese Cyber Espionage

    The U.S. and China opened high-level security and economic discussions last week in Washington, and critical cybersecurity concerns are on the agenda. The Administration’s diplomatic efforts on cybersecurity, however, have so far failed to deter aggressive Chinese cyber attacks against the U.S. public and private sectors. Over the past year, … More

    Edward Snowden Dodges Cybersecurity Regulations

    Edward Snowden, the leaker of the National Security Agency (NSA) surveillance programs, was reportedly able to smuggle thousands of classified documents out of the NSA simply with thumb drives. Despite the NSA’s secret and powerful security measures, Snowden later arrived in Hong Kong with four laptops containing classified information. Three … More

    Cybersecurity: Homeland Security Follies

    The Department of Homeland Security (DHS) just found out that it had a cybersecurity vulnerability for the past four years that could have led to personally identifiable information being stolen by hackers. If the government, and specifically DHS, can’t administer its existing cyber standards, then there is no reason to … More

    Cybersecurity: Government Regulations Can’t Keep Up

    For the first time since 2005, the U.S. National Institute of Standards and Technology (NIST) has revised the federal cybersecurity standards. Since the last update, flash memory, Wi-Fi, smartphones, microchips, and social media have burst onto the scene. Why has NIST not updated the federal cybersecurity standards much sooner? Because … More

    Top-Down Cybersecurity Regulations: An Outdated Solution

    Cybersecurity is a hot issue, and with the House of Representatives’s approval of the controversial Cyber Intelligence Sharing and Protection Act (CISPA) this week it is likely to get hotter. As of last night, groups opposing the bill had collected over 100,000 signatures asking the President to make good on … More

    Morning Bell: Keeping Americans Safe Online

    Everything we do is online. If you’ve been the victim of identity theft or an email phishing scam, you know how quickly your personal data can be stolen or threatened. It’s important to know the difference between types of cyber threats and the right approach to fighting them. There are … More

    Internet Hit by Largest Cyber Attack Yet

    This week, the largest cyber attack to date hit the Internet. Spamhaus, an anti-spam company, placed Cyberbunker on their black-list of spam generating companies. Cyberbunker quickly retaliated with a Distributed Denial of Service (DDoS) attack, which essentially overwhelms a system with requests. The initial attack failed to overwhelm Spamhaus and … More