Sign-up to receive weekly Defense email updates with news, commentary, photos, videos and more!
Focusing on the critical interplay of programs, policy, funding and operations to provide integrated intelligence and global perspective to defense and government leaders worldwide.
Aerospace Daily & Defense Report is relied upon for the latest, critical intelligence on programs, budgets and policies in defense, as well as military and civil space.
Unmanned Horizons is a dedicated section of AviationWeek.com's defense coverage of unmanned systems.
Access news, blog posts, videos, photos and other exclusive unmanned systems-related defense content.
Aviation Week is proud to announce its new Innovation Special Topic page supported by Booz Allen Hamilton.
Check out articles, white papers, interactive features and more related to aviation, aerospace and defense innovation.
Join defense leaders for the annual event focused on improving program performance!
An interesting peek at top cyberdefenses comes from a list of “best anti-malware” assembled by Government Security News, a homeland security trade publication. Criteria for the list were electronic capabilities aimed at “sniffing out bad things that already lurk” in cyberspace. The toolbox provides an interesting survey of digital dirty tricks. The following is a précis of four new capabilities:•RSA Netwitness Spectrum allows automatic analysis of every executable item in a network to determine its maliciousness. It looks for deviations from a known good state without signatures, and it prioritizes the results. Spectrum uses four distinct and concurrent analytic methodologies to deliver consolidated and prioritized malware analysis that combines threat intelligence, deep packet inspection, multi-vendor sandboxing and static analysis to ensure maximum visibility into advanced threats. It tells users where the threat made its entry, how it moved laterally, what systems were owned, what data were exfiltrated, and when.•Invincea Browser Protection creates a protective “bubble” around browsers, which are a primary attack point for malware. It protects users against spear-phishing and other online threats that target critical defense contracting networks and government agencies. It also is designed to make business infrastructures more resilient to attacks by addressing exploitation of end-user trust. By placing browsers in a protective bubble, it creates an “airlock” that seals potential intrusion vectors until the execution of activity can be proven safe to prevent lateral movement of infections within the network.•The M86 Secure Web Gateway (SWG) scans web-page code and analyzes the code’s true intention upon execution, enabling organizations to safely communicate via the Internet and social networks. If malicious intent is detected (e.g., stealing data), it can remove the code and still load the page, or block the page all together. The gateway can scan and analyze web code to determine what will happen upon execution of a web page, and it can strip out malicious code, then load pages safely.•GFI Sandbox is a malware tool that analyzes most Windows applications or files including infected Office documents, PDFs, malicious URLs, Flash ads and custom applications for suspicious or malicious behavior. It also provides kernel-level file monitoring, allowing for analysis of any file or URL. It gives a view of threat elements from infection vector to payload execution. The capability lets agencies identify threats, including custom malware designed exclusively to compromise their networks. Additionally, investigative agencies can use SandBox for forensic purposes, reconstructing how malware was able to infiltrate networks and determining programming tendencies from known malware writers to help track down perpetrators.No price tags for the capabilities were available.
Copyright © 2013, Aviation Week, a division of McGraw Hill Financial.