#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

national security | Breaking Cybersecurity News | The Hacker News

Category — national security
Recent WikiLeaks-Related Cyberattacks Prompt Call for Policy Changes

Recent WikiLeaks-Related Cyberattacks Prompt Call for Policy Changes

Dec 14, 2010
In New York on Sunday, lawmakers urged President Obama to expand the U.S. State Department's foreign policy mechanisms to address crime and security on the Internet. They cited recent attacks on companies severing ties with WikiLeaks as a main reason for these changes. At Symantec's New York City office, Senator Kirsten Gillibrand and Representative Yvette D. Clarke urged the President to adopt proposals to protect New York businesses and infrastructure. These proposals would put foreign countries that fail to enforce cybersecurity laws on notice and even apply sanctions to those that do not cooperate. For the past week, MasterCard, Visa, PayPal, and other American companies faced coordinated attacks after cutting ties with WikiLeaks. The lawmakers explained during a press event that the global cyber assault was "intended to flood the companies' websites with traffic," blocking access and leaving them unavailable to customers. In addition to these attacks, State De...
U.S. Faces Shortage of Computer Science Graduates Amid Rising Cybersecurity Needs

U.S. Faces Shortage of Computer Science Graduates Amid Rising Cybersecurity Needs

Dec 14, 2010
The United States could soon face a significant shortage of computer science professionals unless it starts graduating more students in this field. At a time when computer hacking and security are critical issues for both the government and the private sector, the U.S. is producing only 9,000 computer science graduates annually. Among them, only 700 specialize in computer and information systems security. This number is far from sufficient, especially when considering that a single defense contractor, Booz Allen Hamilton, alone needs 1,000 computer security specialists. Meanwhile, the military is dealing with the rapid rise of cyber warfare. It is becoming increasingly clear that while a traditional military attack on the United States is unlikely, the nation's economic system could be vulnerable to a cyber attack. Conversely, the U.S. can leverage its cyber capabilities to attack other countries. For instance, in September, Iran's nuclear program was disrupted by a computer...
Canada Aims to Strengthen Cyber Defense with $90 Million Security Plan

Canada Aims to Strengthen Cyber Defense with $90 Million Security Plan

Oct 31, 2010 Cybersecurity / Public Safety
Canada released its Cybersecurity Strategy this month, emphasizing the immense challenge of protecting government and corporate computer systems. "There is no simple way to detect, identify, and recover from attackers who cannot be seen or heard, who leave no physical evidence behind them, and who hide their tracks through a complex web of compromised computers." The $90 million (Canadian) strategy focuses on three main areas: Secure government systems : The government will implement the necessary structures, tools, and personnel to fulfill its cybersecurity obligations. Create partnerships to secure non-governmental systems : In cooperation with provincial and territorial governments and the private sector, the government will support initiatives to enhance Canada's cyber resiliency, particularly in critical infrastructure sectors. Help Canadians be secure online : The government will provide Canadians with the information they need to protect themselves and the...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
Business Case for Agentic AI SOC Analysts

Business Case for Agentic AI SOC Analysts

Jun 27, 2025Artificial Intelligence / Security Operations
Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets are no longer keeping pace. Today's security leaders are expected to reduce risk and deliver results without relying on larger teams or increased spending. At the same time, SOC inefficiencies are draining resources. Studies show that up to half of all alerts are false positives, with some reports citing false positive rates as high as 99 percent . This means highly trained analysts spend a disproportionate amount of time chasing down harmless activity, wasting effort, increasing fatigue, and raising the chance of missing real threats. In this environment, the business imperative is clear: maximize the impact of every analyst and every dollar by making security operations faster, smarter, and more focused. Enter the Agentic AI SOC Analyst The agentic AI SOC Analyst is a force multiplier that enables organizations to do more with the team an...
New Rules Enable Military Assistance During Domestic Cyber-Attacks

New Rules Enable Military Assistance During Domestic Cyber-Attacks

Oct 31, 2010
The Obama administration has revised federal policy, enabling the military to assist during a domestic cyber-attack, reported the New York Times on Oct. 21. Typically, the military cannot deploy units within the country's borders, except for natural disasters, and even then, a presidential order is required. However, under a new agreement between the Department of Defense and the Department of Homeland Security, military cyber experts can now be called upon if critical computer networks in the United States are attacked. Robert J. Butler, the Pentagon's deputy assistant secretary for cyber policy, told the Times that this policy change will allow agencies to focus on how to respond to such attacks more effectively. The two agencies "will help each other in more tangible ways than they have in the past," Butler stated in an article in Defense News, an Army Times publication. He added that closer collaboration will provide "an opportunity to explore new ways for ...
Expert Insights Articles Videos
Cybersecurity Resources