Cyber Security Trends for 2012

Tech trends and storylines to watch in 2012
Washington Post
'Hacktivism' and other cybersecurity threats will get more sophisticated. Both McAfee and Cisco say in their annual forecasts that they expect “hacktivism” to be a prominent cybersecurity issue in 2012. Groups like Anonymous, they say, will continue to ...

Dramatic changes ahead for cyber security in 2012 | TechJournal ...
By admin
Dramatic changes ahead for cyber security in 2012.
TechJournal South

Raytheon enhances cybersecurity business
UPI.com
30 (UPI) -- Raytheon is enhancing its cybersecurity business for the US military and intelligence community with the acquisition of Henggeler Computer Consultants Inc. Raytheon's purchase of Henggeler is completed, Raytheon said, but terms of the ...

Mobile Phone Users Remain Lax About Cyber-Security, Says McAfee
eWeek
About 70 percent of smartphone owners said they considered their devices to be safe from cyber-crime, according to a report from the National Cyber-Security Alliance and McAfee released Dec. 27. Even though the report was primarily consumer-oriented, ...

Cyber Security Jobs & Training Are On The Rise Bucking Unemployment Trend
Z6Mag
The graphic we're sharing from Indeed.com shows that the Cyber Security job outlook is incredibly bright and for now is only going straight up. When looking at other job trends most don't have such a growth curve as cybersecurity type jobs. ...

Authorities concerned by cyber-security of cars
Torque News
By Don Bain on Thu, 12/29/2011 - 21:17 Federal authorities are growing increasingly alarmed that our automobiles, being ever more computer, Bluetooth, Wi-Fi and satellite connected, could possibly be hacked en masse by enemies of America with bad ...

Torque News

DHS Introduces Blueprint for Cybersecurity
IT Business Edge (blog)
It will be quite an undertaking in an area where people are still trying to figure out how to definecybersecurity jobs, as my colleague Susan Hall pointed out earlier this month, writing: The federal government's difficulty in defining cyber security ...

Breakingviews: Confidence key for tech trends in 2012
Reuters Video
Dec. 29 - The importance of confidence in cloud computing and cybersecurity are two of the hottest trends in tech.

Dell, Cisco, IBM Among Top Buyers of Security Companies in 2011
eWeek
Global cyber-security spending in 2011 reached $60 billion and is expected to grow 10 percent every year for the next three to five years, according to the "Cyber-SecurityM&A" report released by PwC recently. Below, eWEEK has put together a baker's ...

eWeek

Small business defense against cybercrime
Reuters Blogs (blog)
A recent survey by Symantec and the National Cyber Security Alliance shows 85 percent of small business owners believe their company is safe from hackers, viruses, malware or a cyber-security breach. Sixty-nine percent rely on Internet security for ...

Reuters Blogs (blog)

Shaping California's Smart Grid
energybiz
THE NATION'S POWER SECTOR is facing unprecedented changes, ranging from high levels of intermittent loading from renewable portfolio standards to complex cyber-security threats. New technology options, such as bulk electricity storage and plug-in ...

Cyber criminals eye year-end online shoppers
afaqs (press release)
Cyber security experts are advising shoppers to be extra vigilant. Security solutions firm Trend Micro discovered a phishing scam that targets those purchasing an iPhone 4S through eBay. This involved domains that displayed replicated eBay posts for ...

Langevin alarmed after cyber attacks on US Chamber, Stratfor
WPRI-TV 12 (blog)
”When you have a major firm specializing in cybersecurity getting hacked this way, it gives you an idea of how difficult this problem is and how much ground still needs to be covered to better secure our cyber networks,” he said Wednesday in a ...

ESET director says everyone has a role in cybersecurity
San Diego Source (subscription)
By JENNIFER McENTEE, Special to The Daily Transcript Liz Fraumann is director of cybersecurityawareness and education at ESET LLC, a software security provider based both in San Diego and Bratislava, Slovakia. As part of her duties, she leads ESET's ...

Raytheon Acquires Cybersecurity and Software Engineering Firm Henggeler ...
NEWS.GNOM.ES (press release)
ES/ – Raytheon Company (NYSE: RTN) has acquired privately held Henggeler Computer Consultants, Inc., further extending Raytheon's capabilities to serve the cybersecurity, enterprise architecture and systems engineering needs of customers in the ...

Technology developments to track
Trinidad Guardian
On the business side, faster Internet access, cybersecurity, affordable computing, the shift from Web to mobile and the availability of relevant information technology (IT) skills have been top concerns. These developments are transforming the role and ...

Trinidad Guardian

Network and Database Security will Dominate in 2012 (AKAM, VRNI, SYMC)
SmallCap Network
... to Symantec Corporation (NASDAQ:SYMC), trading today at $15.69, to VIROGEN INC (PINK:VRNI) trading today at $0.10; I believe whatever price range a new buyer finds 'attractive' as an “Entry Level” threshold into the cyber security industry, ...

People to Watch: ANDRE DURAND
Denver Business Journal
Why he's important: Ping Identity's growth, its aim to go public by the end of 2014 and its place at the intersection of cloud and mobile computing, social networking and corporate cyber securitymake it a bellwether of Denver-area tech employment and ...

5 IT Security Lessons for the New Year
GovInfoSecurity.com
In Scared Straight, New York State Cybersecurity Director Tom Smith said: "There's a clear understanding that they want to address those risks before they're the ones who have the breach that is discussed in the news." Even in tough economic times, ...

Google, Amazon And Others May Go Dark Over SOPA
TechWeekEurope UK
This followed a report from Republican congressman Dan Lungren, who heads the Homeland Security subcommittee on cybersecurity, said SOPA would undercut national security. His concerns were supported by the US Department of Energy declaring that the ...

TechWeekEurope UK

Got a newer model wireless router? Read CERT warning
Examiner.com
... and released firmware with mitigations in place." Craig Heffner and his team have reportedly released a tool, “Reaver” at Google Code. The latest US Department of Homeland Cyber-SecurityDivision warning could affect millions of wireless routers.

IT Security 2012: Top Predictions, Threats
Channel Insider
--Cyber Security and Information Assurance Division of Kroll Inc. "CIOs will be more buttoned up about specific ROI/Cost models as it relates to security, and will move away from knee-jerk 'we have no other choice but to do it this way, ...

Channel Insider

Interview: Alexander Chachava, President, Leta Group (The Holding Company of ...
CRN.in
We plan to work closely with Nasscom and DSCI, and conduct special programs on cyber securityfor children, government officers and law enforcement agencies. We recently tied up with several R&D organizations in India which specialize in IT security, ...

Finding Optimism in a Longer View of Equities
New York Times
Risks in the Cloud Cloud computing and cybersecurity are hot and fast-growing markets. But faith in the cloud took a knock with service disruptions at Amazon and elsewhere in 2011. And the hacking of prominent targets like Sony underlines the need for ...

"Who would have guessed it?" Lieberman exulted. "Joe Lieberman, the weekend ...
The Connecticut Mirror
With debt reform seemingly off the table, Lieberman, the chairman of the Homeland Security and Governmental Affairs, said his major goal for his final year is passage of the far-ranging cybersecurity bill he has been working on for two years with Sen. ...

Hackers set to dump intel-analysis firm's emails
Washington Times
... and promise the release of N through Z. “The repercussions from the Stratfor emails could be as far reaching as the WikiLeaks release of 250000 State Department cables,” said cybersecurity expert Richard Stiennon, who blogs at ThreatChaos.com....

Washington Times

Raytheon Purchases Md. Cybersecurity, Enterprise Architecture ...
By Tim Watson
(NYSE: RTN) has acquired Columbia, Md.-based cybersecurity, enterprise architecture and systems engineering firm Henggeler Computer Consultants for an undisclosed amount. Raytheon's announcement said the company does not expect ...
GovCon Wire

Advances in Cloud Computing, Cyber Security Go Hand-in-Hand ...
By jacob
Advances in Cloud Computing, Cyber Security Go Hand-in-Hand. By jacob On December 30, 2011 · Leave a Comment · In Uncategorized. Cloud computing and cybersecurity are both hot, fast-growing markets. But faith in the cloud took a ...
SecureWorld Post

U.S. Department of Homeland Security National Cyber Security ...
U.S. Department of Homeland Security National Cyber Security Division and Idaho National Laboratory Win National Cybersecurity Innovation Award ...
news.yahoo.com/u-department-homeland-security-national-cy...

Confidence in cloud, cybersecurity key to growth | Considered View ...
They're both hot $60 bln markets. But faith in cloud computing took a blow in 2011 with outages at Amazon and elsewhere. And the hacking of targets from Sony ...
www.breakingviews.com/confidence-in.../1621157.article

Security Will Top IT Concerns for 2012 | IT Security Issues ...
The increase in cybersecurity attacks and data breaches will lead to the introduction of a formal information-sharing database. Risk is Security's New ...
www.ittechnewsdaily.com/223-security-concerns.html

NATO solicits bids to expand cybersecurity abilities ...
Lockheed Martin and Northrop Grumman are among the defense contractors lining up for a shot at the $42 million contract.
www.federalnewsradio.com/?nid=241&sid=2675403

House Bill Would Increase DHS Cybersecurity Responsibility
Dan Lungren (R-CA), Chairman of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, and seven other House members, ...
www.hstoday.us/.../6408fe6180dcf916848e3e075997b079.ht...

Cybersecurity insurance: What you need to know

Cybersecurity insurance: What small businesses need to know
Washington Post (blog)
In fact, these are but a few of many steps business owners can take to prevent cybersecuritybreaches and subsequent data theft. But they aren't foolproof, none of them, not even in combination. The total number of cyber attacks hit its highest ever ...

5 reasons cybersecurity matters to small businesses
ZDNet (blog)
Depending on the statistics you believe, the average cost of a breach or cybersecurity incident is about $190000. Do you have that sort of money to lose? Even more serious: about half of small businesses still don't back up their data, so what is lost ...

Cybersecurity career experts: Mobile app security skills hot in 2012
SearchSecurity.com
Recruiters recommend the path to cybersecurity career success is found by having a well-rounded skill set and the ability to communicate effectively in a business environment. “If you want to stand out, go do the things most people don't do; ...

A winding cybersecurity road
ModernHealthcare.com (blog)
But last week, I dropped down a rabbit hole and spent about a half hour exploring a strange new (to me, at least) netherworld of healthcare cybersecurity. I've written a little about healthcare IT and national security and the possibility that people's ...

Cyber security at the forefront of business thinking in 2012
Chartered Management Institute (blog)
According to Mark Dampster, associate of the Centre for Cyber Security, the amount of data being produced currently is "heart stopping". He explained that the nature of the data, such as confidential information, its location and the context it can be ...

Viewpoint: We must resist over-hyping security threats
BBC News
By James Lyne Senior technologist, Sophos 2011 has been the year of cybersecurityawareness, with the headlines frequently featuring reports of serious cyber-attacks and references to "cyber-warfare". As a result, "cybersecurity" has gained much needed ...

BBC News

The Emperor's New Public-Private Partnership
Nextgov
By Jessica Herrera-Flanigan 12/29/11 12:14 am ET These days, there is much chatter in thecybersecurity space about the need for robust "public-private partnerships." Just last month, the Department of Homeland Security in its Blueprint for a Secure ...

'M'sia needs to produce own cyber security software'
The Borneo Post
KUALA LUMPUR: Malaysia needs to produce its own cyber information security software as depending on foreign software may risk information leaks and intelligence breaches, said a software expert here yesterday. Universiti Putra Malaysia (UPM) Computer ...

2011: Year Of Success For Nation's ICT Sector
Bernama
Despite all the achievements, Malaysia also faces cyber security issues, and the nation is expected to lose RM2.73 billion in the next five years if it is not properly managed. A total of 7404 cyber security cases were handled by CyberSecurity ...

Vishing and smishing you a Happy New Year
Examiner.com
December 28, 2011 Cyber security experts warn that the latest research evidences a considerable increase in two malicious schemes known as vishing and smishing. The FBI and USDepatment of Homeland Security CERT provide up to date information on cyber ...

Government to Strengthen Security of Information Systems
ERR News
A new cyber security plan approved today by the Cabinet would better defend national information systems from potential cyber attacks and system failures. Next year, the Ministry of Economic Affairs will conduct a nationwide cyber-security exercise. ...

Complexity Major Info Risk Challenge
GovInfoSecurity.com
"We see this as being fairly debilitating in regards to implementing goodcybersecurity programs," Ron Ross, senior computer scientist at the National Institute of Standards and Technology, says in a roundtable discussion on new trends in information ...

GovInfoSecurity.com

Why Compliance Can't Create Security
GovInfoSecurity.com
Credit Eligible Regulators push tougher cybersecurity measures. But the challenge for smaller organizations isn't compliance - it's budgets. Wendy Nather of 451 Research defines the 'Security Poverty Line' and what to do about it. ...

GovInfoSecurity.com

Financial terrorism
The Economist
In 2010 Symantec, a cybersecurity firm, estimated that three-quarters of all “phishing” attacks, in which people are deceived into surrendering private details such as account numbers, are aimed at the finance sector. Bob Greifeld, the boss of NASDAQ, ...

Iowa GOP Ups Protection Against Hacker Attack
WNYC (blog)
Law enforcement and cyber security geeks are also on high alert following a threat from a group of hackers delivered via video. "The video claims to be from Anonymous, a loosely organized group of hackers that has claimed credit for attacks on targets ...

Anonymous strikes private security firm “Stratfor”
Daily Caller
By Alexi Mostrous - The Times Published: 5:50 PM 12/28/2011 A cyber securityanalyst looks at code in the Malware Laboratory during the first tour of the government's secretive cyber defense lab intended to protect the nation's power, ...

Daily Caller

COMMENT: The changing face of cyber terrorism —Musa Khan Jalalzai
Pakistan Daily Times
To combat the forces of financial jihad, Britain's Cyber Security Strategy was published in November 2011, which underlined the technicality of the threat faced by the country's institutions from economic jihadists and state-sponsored cyber forces. ...

McAfee Labs predicts Windows 8 attack threats for 2012
Neowin
The amount of threats to PCs and mobile devices continues to increase, according to a new paper released today by Intel-owned cyber security company McAfee. The paper, which can be read in full in PDF format, goes over those predictions which include ...

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage ...
Lawfare (blog)
But his book brings the subject together more cogently and cohesively than do prior alarmed warnings about our cybersecurity future. It thus deserves pride of place in a literature we can all hope will read some day as a mere expression of anxiety at ...

DHS Division, Idaho National Lab Win Cybersecurity Award
Renew Grid
by Renew Grid on Wednesday 28 December 2011 The US Department of Homeland Security's (DHS) national cybersecurity division and Idaho National Laboratory have won the 2011 US NationalCybersecurity Innovation Award for building cybersecurity skills ...

Online scammers prey on holiday mood
AsiaOne
Cybersecurity experts that my paper spoke to said that the holiday season historically sees a significant rise in the number of online threats by cyber scammers taking advantage of victims who might be away on holiday. In a study published in September...

AsiaOne

News Bites: GoDaddy accused of delaying SOPA transfers
The Hill (blog)
... Web domain service GoDaddy of delaying transfer by customers angered by the firm's now-withdrawn support for the Stop Online Piracy Act. The hacking of security think tank Stratfor highlights the complexity of the current cybersecurity debate. ...

US-CERT Warns Of Security Flaw In Wireless Routers
CRN
US-CERT is part of the National Cyber Security Division of the US Department of Homeland Security. The organization is a partnership between Homeland Security and the private and public sectors.

Online security breach raises key question
Yuma Sun
Jerry Irvine of the National Cyber Security Task Force told the New York Times that “getting into a system is really not that difficult.” Well, if there isn'ta way to make it a lot more difficult — if not impossible — then maybe it is time to ...

New DoD Plan Could Be Big Boost for Clouds
Internet Evolution
Fortunately, the NDAA includes a significant set of provisions to improve cybersecurity. For now, we can only speculate on what the DoD CIO will propose in the performance plan and the effect it will have more broadly on cloud computing innovation and ...

Aggressive Phishing Attack Targets Military Personnel
InformationWeek
... although the number of actual incidents have been slacking off while other types of attacks have been on the rise, according to the United States Computer Emergency Readiness Team (US-CERT), which keeps track of US cybersecurity incidents. ...

Belatedly, state starts efforts to set up IIIT
Times of India
It was supposed to offer research programmes in various emerging fields such as cyber security and image processing, networks and mobile computing, banking and insurance, energy and transportation, analytics, remote sensing, agriculture, energy, ...

Anonymous, RSA Lead the Top IT Security News of 2011
eWeek
Richard Clarke, the former cyber-security czar for President George W. Bush, has identified China's government and its industries as a major source of cyber-hacking and espionage targeting intellectual property and competitive information. ...

eWeek

Has Politics Trumped Truth?
Forbes
Opponents (including Consumer Electronics Association) argued how the bill would hurt America'scyber security, the technical integrity of the Internet, start-up Internet companies and websites with user generated material. ...

The Hacks That Mattered in the Year of the Hack
The Atlantic Wire
In February, Anonymous decided to declare war on Aaron Barr, chief executive of the once-relatively little known cyber security firm HBGary Federal. Barr had made the silly mistake of publicly announcing that he'd infiltrated the collective and knew ...

The Atlantic Wire

Hackers Leak Data of 46 Million Users in China
NTDTV
But analysts like the former president for Yahoo China, Xie Wen, say that won't solve the problem because China's cyber security is low. "A lot of Chinese internet companies are poorly constructed, with low quality technical input. ...

Staying safe online: the need for cybersecurity | TruckerSteve.ORG
By admin
The day that President Obama launches review of cybersecurity policy, to hear from experts and officials in the field. This video features Secretary.
TruckerSteve.ORG

Are we serious about cybersecurity? - Blogs - WindowSecurity.com
By Debra Shinder
Sometimes it seems as though cybersecurity is a little bit like the weather: everybody talks about it but nobody does anything about it. We might not be able to do much about the weather (although with some of today's technology, that's ...
Deb Shinder's Blog

Cybersecurity career experts: Mobile app security skills hot in 2012 ...
By lowes1
Cybersecurity career experts: Mobile app security skills hot in 2012 SearchSecurity.com “If you want to stand out, go do the things most people don't do; learn how to speak; learn how to write; things a computer science education didn't advent ...
Why CTE: Career Technical Education

International Cyber Arms Bazaar Demonstrates Depth US Must Go ...
By Gino Troiani
International Cyber Arms Bazaar Demonstrates Depth US Must Go for Cybersecurity. dhs.gov. Earlier this month, a diverse crowd of government agents, private developers and hackers from around the world gathered at a Hilton in Malaysia's ...
The New New Internet

DHS | DHS' Progress in 2011: Strengthening Cybersecurity
DHS' Progress in 2011: Strengthening Cybersecurity. Highlighting Our Progress in 2011: Department of Homeland Security. Motherboard close-up. In FY 2011 ...
www.dhs.gov/.../2011-dhs-accomplishments-strengthening-cy...

Major cyber security events of 2011

Major cyber security events of 2011
Financial Post
If 2010 was the Year of Vulnerability to cyber crime, then 2011 was the year hackers took advantage of that vulnerability. Below, we take a look back over the past 12 months at some of the defining moments in hacker history. ...

Financial Post

Hack highlights debate over government versus business cybersecurity
Nextgov
In October, a report by the Internet security firm Symantec and the National Cyber Security Alliance said that companies with fewer than 500 employees are often ill-prepared to prevent cyberattacks, even though nearly half of attacks are aimed at small ...

Is Smart Grid Cyber Security a Losing Game?
IT Business Edge (blog)
The grid has long been a worry for cyber security experts. The MIT study reinforces those concerns and takes them a step further by indicating that ground is being lost despite the general acknowledgement of the problems and efforts by several federal ...

Those pesky passwords — cyber security has run amok
Enid News & Eagle
On Cyber Monday, the Monday after Thanksgiving, $1.25 billion was spent by bargain-hunting online shoppers. On Christmas Day, thanks to those apparently unhappy with the gifts Santa toted down their chimneys, cyber shopping jumped 16.4 percent. ...

M'sia needs to produce own cyber security software
New Straits Times
"Cyber security is the same as national security involving many operational aspects such as prevention, defence, detecting, intelligence and attack. "It also needs sophiscated technical knowledge in information security and continuous upgrading of ...

Holiday Week Security Fun From Top T-shirts to Tech Humor
Public CIO (blog)
Any funny cybersecurity stories or jokes you can share? Or, what's your favorite techie T-shirt? Happy New Year everyone, and thanks for reading in 2011! I'll be back next week with some 2012 predictions and government technology trends.

Chamber Raid: Hackers Target US Commerce Lobby
E-Commerce Times
Perhaps the chamber was the author of its own cybersecurity problems. It had circulated an internal draft document in May criticizing the White House's legislative proposals on cybersecurity as regulatory overreach, according to the Journal. ...

DHS buys software as part of Einstein 3 deployment
FederalNewsRadio.com
By Jason Miller The Homeland Security Department has been experimenting with the Einstein 3 intrusion prevention cybersecurity software for almost three years. Now it looks as if the agency is ready to move beyond the test phase. ...

Swecker Discusses Cyber Security, Attack on Stratfor
Washington Post
Dec. 27 (Bloomberg) -- Chris Swecker, chief executive officer of Chris Swecker Enterprises, talks about a cyber attack on security-analysis firm Stratfor by hackers claiming to be associated with the group Anonymous. He speaks with Jon Erlichman on ...

California Makes Strides With Grid Modernization
Renew Grid
... a cybersecurity working group may develop a set of goals or metrics that can be used by the CPUC to monitor the effectiveness of utility cybersecurity practices, and potentially form the basis for any future CPUC action on developing cyber-security ...

MVCC unveils new training lab
The Rome Observer
MVCC unveiled its new Cybersecurity Training Lab on Dec. 20 for use by students in the college's CyberJobs program. During a time when many are struggling to find jobs, the $2.8 million, three-year funded training grant is an example of a local success ...

'Who killed Snooki?'
North Brunswick Sentinel
Shreyas Chand and Brianna Mussman participated in the CSAW-VII Cybersecurity Competition at New York University- Polytechnic University, placing third in the nation in the High School Cyber Forensics Challenge. They had to solve a mystery by ...

December 2011: GovCloud Moves From Policy to Law
Forbes
One in particular is their recommendation for a National Office for Cyberspace (NOC) and a new National Security Council Cybersecurity Directorate (NSCCD). Along with the relevant agencies, these organizations would: “Assume expanded authorities, ...

DHS Secret Meet on Domestic Threats
Cryptome.org
Electromagnetic Pulse (EMP) Threat--Lessons Learned and Areas of Vulnerability, and Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal Advisory Committee Act, it has been determined that the meeting ...

Joining Trend, College Grows Beyond Name
New York Times
The goal is to offer master's degrees in industries like cybersecurity, health informatics and project management, matching programs with each city's industries and labor needs, through a mix of virtual learning and fly-ins from professors based in ...

New York Times

2011 & Beyond: Stakes Rise in Cyberwarfare
The Epoch Times
Although cyber-attacks against major companies had been common prior to that, the high-profile attacks brought the realities of cybersecurity into the spotlight. Meanwhile, the power of cyber-attacks in both military action and espionage became a ...

The Epoch Times

Happy New Year: You've Been Hacked
CFOworld
A widespread cybersecurity invasion by the hacking group called Anonymous targeted intelligence firm Stratfor, apparently stealing data belonging to corporate clients from Apple on down, to governmental entities that range from the Miami Police to the ...

Adam's 2012 Tech Predictions
SYS-CON Media (press release) (blog)
The geopolitics of cybersecurity will take center stage. Certain visitors from the Land of the Pandas have been stealing a lot of our things. We've known they are stealing our things for a while. So what's going to change? ...

Cloud Computing Security: Can the Cloud Ever Be More Secure than On-Premise?
Formtek Blog (blog)
VanRoekel said that “we cannot afford to make the false trade-off between cybersecurity and innovation. A lot of people will use cyber as a blanket excuse to not move forward, but I truly believe that moving to the cloud, and a move to the cloud of ...

Recall: Bright economy, dark places
San Antonio Current
As a leader in cyber security, San Antonio is home to many good tech jobs. It's the type of work where there's no room for gray areas. High school nerds, think twice before tweeting critically about Big Brother. You're either with the government or ...

San Antonio Current

A place to be seen, heard
Winnipeg Free Press
Donned in business attire such as suits and ties, the would-be legislators under 20 years old have been debating topics such as international military intervention, cyber-security and marriage laws. "I'm interested in politics because it really affects ...

New Generation Firewall for Highly Advanced Network Security
Business 2 Community
With such dependence, none of us wants to compromise with cyber security. Hackers will keep attacking your system to get what they want; this makes prevention, detection, and responding to the attacks significant. Firewall security is essential for ...

Great Decisions leads off with Middle East expert
Dunwoody Crier
In addition to Middle East realignment, this series includes the topics: promoting democracy, Mexico, cybersecurity, state of the oceans, exit from Afghanistan and Iraq, Indonesia, and energy geopolitics. A briefing book will provide background ...

Lockheed Martin Wins Contract Worth up to $2 Billion to Support the U.S. ...
MarketWatch (press release)
It is responsible for a wide array of information technology systems and services in areas such as health care, energy, transportation, information and cyber security, extreme environments, citizen protection and space exploration. ...

Police, NBI to be strengthened by cybercrime law
Business Mirror
The Cybercrime Prevention Act provides for the establishment of a Cybercrime Investigation and Coordinating Center under the Office of the President which will be tasked to formulate and implement a national cyber-security plan. ...

Military lowers cyber alert level to normal
Yonhap News
Under the heightened cyber alert in the past week, the military doubled the size of its staff handling network security and strengthened its coordination with the government's National Cyber SecurityCenter. Once Infocon is raised, headquarters and ...

Information Security and Privacy Advisory Board Meet
Cryptome.org
... --Discussion/updates on the National Strategy for Trusted Identities in Cyberspace (NSTIC), --Panel discussion on derived credentials, --Presentation on DHS updates and cybersecurity strategy, --Panel discussion on data feedback and network, ...

Cyber attacks target smartphones
The National
Yet mobile phones that run Google's Android operating system, in particular, "will suffer from more cyber criminal attacks", warns Trend Micro, a cyber security firm that recently released a report outlining predictions for attacks in the new year. ...

The National

Protective Gear For Wireless Devices Can't Stop Cybercrime
FOX Charlotte
While people buy covers to protect the outside of their tech toys, cyber security experts say little do they realize how easy it is to crack what is inside. "I mean, I'm not really worried about it, too much, I guess, if you have important stuff," said ...

Swecker Discusses Cyber Security, Attack on Stratfor - YouTube
By Bloomberg
Dec. 27 (Bloomberg) -- Chris Swecker, chief executive officer of Chris Swecker Enterprises, talks about a cyber attack on security-analysis firm Stratfor by ...
Uploads by Bloomberg

U.S. Department of Homeland Security National Cyber Security ...
27, 2011 /PRNewswire-USNewswire/ -- The SANS Institute announced today that Department of Homeland Security National Cyber Security Division and Idaho National Laboratory have won the 2011 U.S. National Cybersecurity Innovation ...
Virtual-Strategy Magazine - Your...

The Seventh Scam of Christmas, Phishing and SMiShing! | Blog ...
By Tracy Mooney
About Me. Tracy Mooney Chief Cyber Security Mom Tracy, a mother of three from a Chicago, Illinois suburb, is a regular mom with the same ... Read More. Feeds & Podcasts. Consumer Blog Feeds · Corporate Blog Feeds · Enterprise Blog ...
Blog Central » Cyber Security Mom

Swecker Discusses Cyber Security, Attack on Stratfor | www.bullfax ...
By marketmaker
Swecker Discusses Cyber Security, Attack on Stratfor. Dec. 27 (Bloomberg) -- Chris Swecker, chief executive officer of Chris Swecker Enterprises, talks about a cyber attack on security-analysis firm Stratfor by hackers claiming to be associated ...
Bullfax.com - Market News & Analysis

Coviello: '2012 Will Be the Year of Resiliency' | threatpost
By Guest Posts
National governments will prioritize cyber security. Across the globe we are seeing governments prioritize cybersecurity as both a national security and economic security issue. The growth in cyber-crime, the rampant theft of IP and other ...
threatpost - The First Stop for...

Group launches national cybersecurity awareness program ...
“The efforts of the Global Institute will further strengthen our collective cyber security strategy by providing focused research and programs that address our ...
healthcareitnews.com/.../group-launches-national-cybersecurit...

US-CERT Cyber Security Tip ST11-001 -- Holiday Traveling with ...
Cyber Security Tip ST11-001, archive ... For even more information about keeping your devices safe, read Cybersecurity for Electronic Devices. ...
www.us-cert.gov/cas/tips/ST11-001.html

Health info sharing center to lead cybersecurity education effort ...
Health info sharing center to lead cybersecurity education effort - Healthcare business news and research | Modern Healthcare.
www.modernhealthcare.com/article/20111226/.../312269964

The SEC Focuses on Cyber Security and Related ... - White & Case
Cyber Risk Factors – Cyber security risk disclosure must adequately describe the ... 1 -Cybersecurity is the body of technologies, processes and practices ...
www.whitecase.com/articles-12202011-1/

Benchmarking Opportunity — ENISA Releases Cyber Security ...
You are here: Home / Security / Cybersecurity / Benchmarking Opportunity — ENISA ReleasesCyber Security Incident Reporting Guideline Documents ...
www.continuitycompliance.org/benchmarking-opportunity-en...

Firms team for NATO cybersecurity work
21 (UPI) -- Italy's Finmeccanica and U.S. company Northrop Grumman have joined to help NATO boost its ability to quickly detect and respond to cybersecurity ...
www.istockanalyst.com/.../firms-team-for-nato-cybersecurity-...

Top Cybersecurity stories of 2011

Security Roundup: The top stories of 2011
Computing
By Stuart Sumner Cyber security continued to have a high profile in 2011 with the UK government pronouncing cyber crime one of the top three threats to the country. There were also several high-profile hacks of large enterprises as well as the ...

Computing 

NIST Seeks Cybersecurity Services on $70M IDIQ
GovConWire
The National Institute of Standards and Technology is seeking contractors to provide cybersecurityservices through an indefinite-delivery/indefinite-quantity contract with an anticipated value of $70 million. According to a Dec. ...

Cyber Threat to Power Grid Puts Utility Investors at Risk
Forbes
The electric-utility industry's concerns about cyber security has escalated sufficiently for several investor-owned utilities to include cyber-attacks as a material risk factor in recent filings with the US Securities and Exchange Commission. ...

Intelligence firm Stratfor reels after data breach. What did hackers get?
Christian Science Monitor
The issue of cybersecurity has grown increasingly important to both government and corporations, and some members of Congress are calling for greater cooperation between the public and private sectors. Two weeks ago, Rep. Peter King (R) of New York and ...

Christian Science Monitor

A year of Malware and Internet Spying Ahead
Siliconindia.com
By SiliconIndia, Tuesday, 27 December 2011, 05:25 Hrs Bangalore: The cyber-security industry warned internet users of a drastic rise in the rate of cyber-spying and reported that the hackers would use the most advanced kind of malicious software to tap ...

Is Cubic Corporation Fairly Valued?
Seeking Alpha
The company recently added a cyber security and asset tracking businesses. According to management, the company's transportation systems business is the leading provider of automated revenue collection systems and services worldwide, providing complete ...

How BAE Systems fights paedophiles and cyber criminals
This is Money
By Ruth Sunderland BAE Systems is better known for submarines and fighter jets than helping protect vulnerable children, but its cyber-security arm Detica has won recognition for its work with the Child Exploitation and Online Protection Centre to ...

This is Money

Insurance FYI: Social Media, Liability and Insurance
VillageSoup Belfast
Meanwhile, amid a rising number of high profile data breaches, government is stepping up its scrutiny of cyber security. This is leading to increased calls for legislation and regulation, placing the burden on companies to demonstrate that the ...

Stories appearing in Tuesday's edition of The Herald-Whig
Quincy Herald Whig
... Missouri is expected to receive more than $320000 from a national legal settlement with GE Funding Capital Market Services Inc. as part of an investigation into municipal bond derivatives;Missouri is earning recognition for its cyber security ...

2011 Year in Review: Collaboration
VAdvert Press Center (press release)
4. Security Quiz [INTERACTIVE]: Test Your Cyber Security Intellect Security breaches are costly and the number of attacks is on the rise. Is your business prepared for the next breach? Take the quiz to learn more.

The best LinkedIn groups for healthcare and life science innovation
MedCity News
But there are also issues covered here that take a different perspective to issues covered in other groups such as how individual practices are approaching cyber security for their electronic medical record (EMR) files. Medical Devices Group. ...

RCom shuts access to file-sharing sites
Business Standard
Dominic K, a cyber security expert, said, “A John Doe order is a type of injunction granted by courts in cases where an anonymous person maybe committing a breach of the rights of the plaintiff and cannot be identified by the plaintiff at the time of ...

Business Standard

What's Your Major? Working Toward the Uninvented Job
MindShift
According to Career Builder, the most promising majors will be related to cyber-security specialists, mobile application developers, social media managers, stem cell researchers, robotics technicians and simulation engineers. These jobs didn't exist 10 ...

2012 will begin a massive expansion in cyber attack insurance
Live Insurance News
According to the principal of the cybersecurity team at Good Harbor Consulting, Jacob Olcott, that's precisely what cyber insurance is. He added that “Everybody needs it, and most companies don't realize they don't have it until it's too late. ...

Live Insurance News

NCSA Develops Strategic Partnership to promote cyber security ...
By admin
A study conducted by Microsoft and NCSA, “The 2011 State of K-12 Cyberethics, Cybersafety andCybersecurity Curriculum in the United States” found that 36% of U.S. K-12 teachers received zero hours of professional development training ...
iKeepSafe

Homeland Security Committee Unveils Cybersecurity Bill
The House unveiled a cybersecurity bill that would establish a quasi- governmental entity to coordinate information-sharing with the private sector. By Brian ...
thenewamerican.com/.../10241-homeland-security-committee-...

Missouri Recognized For Superlative Cyber Security Website - kspr ...
Contestants are judged on cyber security content, usability, accessibility and appearance. The goal... Visit the award-winning site at www.cybersecurity.mo. gov ...
www.kspr.com/.../kspr-missouri-recognized-for-superlative-cy...

Cyber Security Expert Sileo in USA Today | Identity Theft Expert ...
You are at a higher risk of cyber and identity theft when traveling for work or pleasure. Cyber security expert John Sileo speaks with USA Today about solutions.
www.sileo.com/cyber-security-expert-sileo/

Stratfor hacked by Anonymous

Stratfor hacked by Anonymous - Terry Zink's Cyber Security Blog ...
By tzink
A blog about fighting spam and malware by a member of Microsoft Forefront Online Security anti-spam team. . . .  They were able to access the data because it wasn’t encrypted . . .
Terry Zink's Cyber Security Blog

Health info sharing center to lead cybersecurity education effort
ModernHealthcare.com
By Joseph Conn The not-for-profit National Health Information Sharing & Analysis Center will lead an effort to develop a cybersecurity educational framework and support programs that will build the country's cybersecurity workforce and help better ...

Missouri earns recognition for cyber security website
The Republic
The contest is part of Cyber Security Awareness Month. Contestants are judged on cyber securitycontent, usability, accessibility and appearance. The goal of the competition is to highlight good sites so others can use them as examples.

The 10 biggest tech stories of 2011
CNN
Very influential tech pioneers died; cyber-security cost companies billions of dollars; and trends in electronics and on the Web provided new tools and created new challenges. Smartphones and tablets each grew so immensely this year that we decided to ...

Government Clearinghouse for Cyber Threats
IT Business Edge (blog)
By date: Imagine if there were a way for the government to share information about cybersecuritythreats with private industry. It's an idea that makes sense and an idea that a California congressman would like to see happen. ...

Stratfor hacked; clients and credit card numbers exposed
Boing Boing
“The scary thing is that no matter what you do, every system has some level of vulnerability,” says Jerry Irvine, a member of the National Cyber Security Task Force. “The more you do from an advanced technical standpoint, the more common things go ...

Still Loaded with Pork, Congress Puts Spy World on a Diet
The Inquisitr
Congress left in the budget money allocated for hiring new cybersecurity teams and money to track the finances of terrorists. While in tough financial times most levels of government spending get cut, and most agencies fight over who will get hit the ...

Face the Nation's 2012 predictions
CBS News
Justice and Homeland Security Correspondent Bob Orr: "I think maybe for the first time cyber security catches terrorism -- maybe even passes terrorism -- as our top domestic security concern. And I think we're about due for the first true cyber-attack ...

Warwick philanthropy gives $19M to RI projects
Boston.com
Many of the Champlin grant recipients include hospitals, universities and libraries, such as $159160 to equip a new URI facility for cybersecurity, $500000 for a generator for Butler Hospital and $673000 for heating and ventilation at the main branch ...

SOPA/PIPA Explained; GoDaddy loses 21000 domains and stops supporting SOPA
pnosker.com
Other problems that would stem from the bill if it should pass would include a degradation of cyber security due to the harmful process of enforcing the law, hurting the Domain Name System Security Extensions (DNSSEC), and the negative impact it would ...

pnosker.com

Review of Cyber Security Legislation in 2011 | Digital Bond
By pjcoyle
HR 3523 – the Cyber Intelligence Sharing and Protection Act of 2011 – Pre-introduction hearing; • S 21 – Cyber Security and American Cyber Competitiveness Act of 2011 – No Action; • S 372 –Cybersecurity and Internet Safety Standards Act ...
Digital Bond's SCADA Security Portal

ENISA Report on Maritime Cyber Security
ENISA Report on Maritime Cyber Security Due to the high complexity, it is major ... Government Cyber Strategy Directs Billions for R and D · DHS Cybersecurity ...
www.infosecisland.com/.../18936-ENISA-Report-on-Maritime...

Who Do You Trust? Proposed Cybersecurity Bill Would Encourage ...
Who Do You Trust” was a 1950's game show that required players to decide whether they could rely upon the information provided by t.
privacylaw.proskauer.com/.../who-do-you-trust-proposed-cyb...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com