Create an Account
username: password:
 
  MemeStreams Logo

it's an open invitation

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
it's an open invitation
Topic: Miscellaneous 7:07 am EDT, Mar 23, 2015

Bob Work:

The third offset strategy is an open invitation for everyone to come to the table ... to creatively disrupt our defense ecosystem. Because we'll either creatively disrupt ourselves or be disrupted by someone else.

Jane Harman:

The CIA should remember that just because it can do something doesn't mean it should.

Cisco's John Stewart:

We ship [boxes] to an address that has nothing to do with the customer, and then you have no idea who ultimately it is going to.

Ashton Carter:

Ensuring that cyber troops have the training, equipment and resources they need is a high priority for the department.

Ellen Nakashima:

The government's efforts to deter computer attacks against the United States are not working and it is time to consider boosting the military's cyber-offensive capability, the head of U.S. Cyber Command told Congress on Thursday.

Gina Chon, Hannah Kuchler, and Kara Scannell:

Hackers, who appear to have stolen network and employee passwords, have accessed Register's network for about a year, said people familiar with the probe.

Brian Krebs:

Premera Blue Cross, a major provider of health care services, disclosed today that an intrusion into its network may have resulted in the breach of financial and medical records of 11 million customers. Although Premera isn't saying so just yet, there are independent indicators that this intrusion is once again the work of state-sponsored espionage groups based in China.

Marianne Kolbasuk McGee:

Some security experts say the attack on Premera may have begun months earlier than May 2014, as the insurer reports. For instance, ThreatConnect, a threat intelligence product and services vendor, says it has found evidence that an attack on the health insurer's infrastructure may have started as early as December 2013, or at least a month before OPM OIG began its onsite audit.

Kate Knibbs:

In the latest update to a PLA publication called The Science of Military Strategy, China broke from its tradition of denying everything related to digital spying and network attack capabilities and explicitly revealed that it has specialized units devoted to using computers as weapons.



 
 
Powered By Industrial Memetics
RSS2.0