DoD Cybersecurity Needs More Organization, GAO Report Says ExecutiveGov The Defense Department has to better coordinate its cyber capabilities so that its efforts incybersecurity are decentralized and spread across various offices, a General Accountability Report says. Federal News Radio reports the GAO report was ... | ||
Field Hearing on the Role of Small Businesses in Cybersecurity YouTube US Senator Ben Cardin and US Senator Barbara Mikulski hold a field hearing on the role small businesses play in the growing cybersecurity industry. | ||
Feds five years behind on cyber security: AusCERT iT News By John Hilvert on Jul 27, 2011 1:30 PM (8 hours ago) The Federal Government was well behind other countries in managing internet threats with several speakers at a two-day cyber security summit in Canberra alleging Government action was 'too little, ... | ||
Current Issue: Cyber Security Conference to Focus on Industrial Incidents Automation World Consequently, cyber security consulting firm Applied Control Solutions (ACS) (www.realtimeacs.com), will host the 11th ICS Cyber Security Conference in the Washington, DC area September 20-22, 2011. The Conference is an international information ... | ||
Cybersecurity Challenges, Opportunities Explored at CompTIA Breakaway 2011 PR Newswire (press release) 1-4 in Washington, DC Cybersecurity is among the noteworthy issues that will be discussed and debated at Breakaway, according to Kelly Ricker, vice president, events and education, CompTIA. "Advancements in cloud computing, wireless capacities and ... | ||
Sourcefire Appoints New Member to Board of Directors MarketWatch (press release) Sourcefire, Inc. /quotes/zigman/103662/quotes/nls/fire FIRE -6.00% , is a world leader in intelligentcybersecurity solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security ... | ||
House committee approves cybersecurity standards bill Infosecurity Magazine (US) The House Science, Space and Technology Committee last week approved the CybersecurityEnhancement Act of 2011, which mirrors legislation passed last year by the House, but that never made it to the Senate, according to a report by the National Journal ... | ||
GAO reports on critical infrastructure protection and cybersecurity Continuity Central (press release) The US GAO has issued a report into critical infrastructure protection and the growing importance ofcybersecurity in this area. - Interconnectivity poses significant risks to the government's and the nation's computer systems, and to the critical ... | ||
US Cyber Security Head Resigns Following LulzSec and Anonymous Hacks Death and Taxes But after a flurry of hacks and cyber attacks from Anonymous and their anarchic counterparts LulzSec, the head of US cyber security Randy Vickers has resigned. The Guardian writes, “The head of the US body responsible for combating cyber-attacks has ... | ||
UK Government Cyber Security Efforts Lose Talent to Private Industry Top Secret Writers As been reported here at TSW and across the web, cyber security is becoming an ever-important issue within the public sector. Not only do government agencies have to contend with the fact that the number of hackers are increasing, but their own ... | ||
Maryland Business Secretary Johansson Testifies Before US Senate Small ... DigitalJournal.com (press release) ... cybersecurity assets to fuel innovation and create jobs in this rapidly growing industry,” said Secretary Johansson. “Since releasing CyberMaryland in January 2010, Governor O'Malley has madecyber-security an economic development priority. ... | ||
Sypris and Partners Host Cyber Capture the Flag Event MarketWatch (press release) A "Capture the Flag" (CTF) event is a cyber security challenge in which players attack the targeted systems of their competitors in order to steal files (flags) as well as defend and detect attacks to their systems. The winning team received a ... | ||
CACI to acquire Paradigm Holdings Computer Business Review The terms of the deal weren't disclosed, though the deal will expand CACI's cybersecuritycapabilities and enterprise IT as well as security engineering capabilities. The acquisition forms part of CACI's growth plan to increase its presence in ... | ||
Flawed DOD cyber strategy adding to network vulnerabilities, GAO finds Defense Systems Compounding the problem is that the department has not created a funding strategy to address itscyber security issues. GAO also found that DOD's newly developed personnel reporting structure for a unified approach to cybersecurity is vague enough to ... | ||
Alex Shagla-McKotch of Red Lambda Wins US Cyber Challenge TMC Net Alex received a special invitation from US Cyber Security leaders in Washington DC to join a team of security experts for a meeting to brainstorm ideas for the first-ever cybersecurity challenge from the National Security Agency (News - Alert) as a ... | ||
| ||
Invertix scouts for 25 workers at Fort Meade office Bizjournals.com (blog) With all the talk these days of cyber security work taking place at Fort George G. Meade, it's easy to lump anyone who moves into that part of Anne Arundel County in with the high-tech hacking field. But that's not the case with Virginia-based defense ... | ||
DHS Officials: Government Networks No More Vulnerable to Cyberattacks National Journal “I wouldn't say we're more vulnerable than five years ago, but we are much more aware,” said Roberta Stempfley, acting assistant secretary for the DHS Office of Cybersecurity and Communications. She defended DHS efforts to manage cyberthreats and told ... | ||
Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs SYS-CON Media (press release) (blog) The cyber security e-mail lists, Twitter streams, Facebook messages and chat circuits were abuzz today over a new report released from the Brookings Institution. This piece, titled ”Pirates of the ISPs: Tactics for Turning Online Crooks into ... | ||
The Internet is still the Wild West Minnesota Daily Cybersecurity is a growing concern as more business is done and more records are kept online. By Frank Bi Just the other day, a close friend from high school sent me an e-mail from Missouri. The message was from a seemingly distressed stay-at-home mom ... | ||
Maryland Governor Martin O'Malley Recognizes Winners of US Cyber Challenge ... RedOrbit The competition, coordinated by the US Cyber Challenge, is a national online contest to identify talented high school students with the skills to pursue advanced education and job opportunities in the cyber security field, one of the most in-demand ... | ||
The Circuit: Franken bashes merger; data caps frustrate customers; Amazon earnings Washington Post (blog) Cyber attacks more frequent: Cyber attacks on the US government appear to be growing more frequent, according to experts who spoke at at House subcommittee meeting on cyber security. Gregory Wilshusen, information technology director for the Government ... | ||
The real online threat: cybercrime OregonLive.com Yes, we're facing enormous cybersecurity problems -- just look at the high-profile penetrations of such companies as Sony and Lockheed, or the millions of Americans whose personal information has been stolen online. But these aren't signs of some ... | ||
The cyber Mafia has already hacked you CNN "The Russians have everyone nailed cold in terms of technical ability," said Greg Hoglund, CEO ofcybersecurity company HBGary. "The Russian crime guys have a ridiculous toolkit. They're targeting end users in many cases, so they have to be ... | ||
15 Members of Trustwave's SpiderLabs Selected to Present at DEF CON Marketwire (press release) CHICAGO, IL--(Marketwire - Jul 26, 2011) - Trustwave, a leading provider of information security and compliance solutions, today announced that fifteen cyber security experts will deliver talks, training sessions and a kids demonstration at DEF CON 19, ... | ||
Congressional Committees Fight Over Cyber-Turf Antiwar.com ... isn't exactly a prestiguous place that top ranking Congressmen desperately seek after an election, but the committee leadership is hoping to change that today, arguing that they should have oversight over the massive “cybersecurity” field. ... | ||
Nominations in for 2011 Pwnie Awards, LulzSec and Anonymous listed Digitaltrends.com Next week will see the fifth Pwnies award ceremony take place – think Oscars for the cyber securitycommunity. In the world of computer hacking, “pwn” means own or control, as in taking control of another person's computer (or the entire computer ... | ||
What Is A “Hack”? Watching the Watchers.org (I have the same objection to the term cybersecurity.) My own flip definition has two parts: Did you use this code to get unauthorized access on someone else's system? If the answer to both is "Yes," it's hacking. If not, you're probably a script ... | ||
Q&A: Jeremy Grant on NSTIC implications for government IT FierceGovernmentIT And NIST is tackling it based on existing work it's doing on cybersecurity and identity management and then the budget that's been proposed for fiscal 2012. So this year it's me and some folks working on details and trying to put a foundation in place. ... | ||
Lockheed Martin (NYSE:LMT) Working On Roadmap eMoneyDaily Lockheed Martin (NYSE:LMT)'s Information Systems & Global Solutions vice president Rick Johnson said, “While Lockheed Martin (NYSE:LMT)'s key areas of focus in the report pertained to cyber security innovation and acquisition, all areas were of equal ... | ||
Tantus Hires Dan Waddell as Director of Information, Security, and Privacy PR Newswire (press release) "I will strive to enhance our visibility and reputation in cyber security and privacy solutions and solidify our role as a trusted adviser to government clients in these critical areas," said Waddell. Waddell has over 18 years of information security ... | ||
DHS - Secretary Napolitano Announces Stop.Think.Connect.™ Campaign ... ISRIA (registration) Campaign will train DARE officers to talk to kids and parents in their communities aboutcybersecurity, and provide them with the Stop.Think.Connect. Community Outreach Toolkit – an all-inclusive resource with simple tips and tools they can use to stay ... | ||
Remains of the Day: Mozilla Announces Latest Project, Boot to Gecko Lifehacker [Facebook] Barack Obama Thinks Your Password Sucks: The President seeks to up cyber securitywith the National Strategy for Trusted Identities in Cyberspace (NSTIC). [Gizmodo] Fragmented sleep 'harms memory': A research study at Stanford University ... | ||
Meeting of Lithuanian Foreign Minister and new British Ambassador focuses on ... ISRIA (registration) The Minister said that Lithuania aimed to participate more actively in shaping of the international community's policy and its principles for cyber security, and that the aforementioned conference would be a great opportunity to discuss important cyber ... | ||
Salaries for recent UK information security graduates increase Infosecurity Magazine Salaries for government-focused CLAS consultants have stabilized, reflecting the recent UK government pledge to spend £1 billion on cyber security over the next three years, according to Acumin. Information security sales people are continuing to fare ... | ||
| ||
Focus on debt ceiling negotiations Lexology (registration) ... completed action on the Commerce-Justice-Science and Legislative Branch bills last week – bringing the total to nine of the 12 annual bills reported out of committee thus far; The Defense Department released its cyber security plan on July 14. ... | ||
Cybersecurity defining issue: US Army chief - Arab News WASHINGTON: The Obama administration's nominee to be the next chairman of the Joint Chiefs of Staff is telling Congress that he expects cybersecurity to be a defining issue of his tenure. Army Gen. Martin Dempsey, in testimony at his ... arabnews - frontpage | ||
DOD Website Sells Public On Cybersecurity Strategy « CyberMaryland By cybermaryland The Department of Defense (DOD) has launched a new website to accompany a comprehensivecybersecurity strategy launched less than two weeks ago to guide the department's efforts to fight cyber attacks going forward. ... CyberMaryland | ||
Why did the director of the American cybersecurity arm of the DHS ... By sakerfa InformationWeek obtained an e-mail that was sent to US-CERT personnel by acting assistant secretary for cybersecurity and communications, Bobbie Stempfley, revealing this resignation. The veracity of the e-mail was confirmed by a ... Dprogram.net | ||
ICCS 2012 REGISTRATION IS NOW OPEN | International Conference on ... By ICCSRam This January 9, 2012, these two organizations will launch the third International Conference on Cyber Security (ICCS 2012) in New York City, the information center of the world. ICCS 2012 will build on the success of ICCS 2009 and ICCS ... International Conference on Cyber... | ||
Sourcefire launches range of IPS CyberSecurity solutions | PC DOT COM By Audrey Sourcefire has recently launched two new IPS solutions to cater for both small to medium businesses to large multinationals and government agencies. PC DOT COM | ||
Cyber Security Management Seminar 2011 By editor The Cyber Security Management Seminar 2011 will take place in Auckland, New Zealand on 17 Aug 2011. ITEvent.NET | ||
The Best and Worst Cybersecurity Headlines | Medill National ... By Paul Rosenzweig The Best and Worst Cybersecurity Headlines. By Paul Rosenzweig | July 27, 2011. Jason Healey, a cyber-expert at the Atlantic Council, isn't too impressed with how the press covers cyber issues. The challenge, of course, ... Medill National Security Zone | ||
Companies To Spend $130 Billion On Cybersecurity In 2011 | TeamSHATTER By TeamSHATTER Admin U.S. companies will spend more than $130 billion dealing with data breaches this year, according to a study by the cybersecurity research firm the Ponemon Institute. The study says the majority of data breaches are due to company ... TeamSHATTER | ||
The Tech Blog – Official blog site for the California Technology ... By Gary Page The U.S. Cyber Challenge (USCC) Cyber security Workforce Development Division announced pre-registration is now open for schools and individuals who wish to compete in the next round of cyber security competition. ... The Tech Blog - Official blog... | ||
FOSE 2011 Government IT Conference – My Thoughts | Light Point ... By Zuly Gonzalez Cybersecurity, Network Defense, and Information Assurance: Strategies and technologies for protecting government information systems and the data that moves across them. Information Management and Collaboration: Ways that new tools and ... The Federal IT Agenda in 2012: This presentation provided perspectives and insights to fellow CIOs, CISOs, and IT/Network managers in government about the direction of cyber security, data center consolidation and the move to cloud ... Light Point Security | ||
House panel approves cybersecurity standards bill - Nextgov The Science, Space, and Technology Committee approved the first piece of cybersecurity legislation in the House of Representatives this year, passing a bill ... www.nextgov.com/nextgov/ng_20110722_7864.php?oref=rss | ||
US, India Sign Cybersecurity Agreement US, India Sign Cybersecurity Agreement. Jul 19, 2011 11:35 AM PDT; Comments: 0 ... Why Private Support of Cyber Security Initiatives May Not Work ... www.circleid.com/.../us_india_sign_cybersecurity_agreement/ |