Cybersecurity conference begins The Hill (blog) By Brendan Sasso - 08/08/11 11:08 AM ET The Homeland Security Department's seventh annual conference on cybersecurity began on Sunday in Nashville, Tenn. The event is hosted by the Homeland Security agency in charge of responding to cyber-attacks on ... | ||
Seoul gets tough with cyber security JoongAng Daily The Korea Communications Commission released its National Cyber Security Master Plan yesterday, which 15 government agencies collectively contributed to. Aside from considering cyber space as Korean sovereign territory, the “master plan” will ... | ||
CPUC Adopts Cyber Security Measures for Smart Meters EnergyBoom By Jeanne Roberts on August 8, 2011 California, a national leader in renewable energy technologies like solar, wind and geothermal, is once again leading the pack with standards designed to protect renewable energy consumers using “Smart Meters” from ... | ||
| ||
Don't Panic Over Looming Cybersecurity Threats Forbes (blog) By ADAM THIERER Panic is in the air — at least, that is, the air surrounding the debate over cybersecurity. It has become virtually impossible to read an article about cybersecurity policy, or sit through any congressional hearing on the issue, ... | ||
Cybersecurity: past, present and future ZDNet Australia By Stilgherrian, ZDNet.com.au on August 8th, 2011 (15 hours ago) Nobody's safe as Stilgherrian turns his laser focus onto Australia's IT industry in a weekly podcast. "An insider who's gone bad can do more damage to your network than almost any hacker ... | ||
Morning Security Brief: New Orleans Verdict, Cybersecurity Survey, I-95 Drug ... Security Management ►Eighty-four percent of cybersecurity experts believe the threat is higher now than it was a year ago, according to a study published last week by the East West Institute. The report surveyed 450 “government and technical leaders” from 40 countries at ... | ||
Ex-intel chief: U.S. cyber-vulnerable UPI.com McConnell's remarks came after California-based cybersecurity company McAfee reported there were at least 70 victims of hacking -- the majority in the United States -- that took place over at least five years and was done by a state actor. ... | ||
Howard Schmidt, White House Cybersecurity Coordinator C-SPAN This week, The Communicators begins a four-part series on US cybersecurity. In this first installment, White House Cybersecurity Coordinator Howard Schmidt discusses the Obama Administration's effort to reduce cyber threats and to protect the US ... | ||
Bolster national cyber defense Charleston Post Courier Michael Dempsey, tapped to be the next chairman of the Joint Chiefs of Staff, recently told the Senate that he expects cyber security to be a defining issue of his tenure. The general's comments should focus timely attention on a major problem area in ... | ||
Government contractors prepare for a rainy day Washington Post Many contactors have already begun responding by buying or selling businesses or reshaping their enterprises to focus on areas likely to grow, such as cybersecurity and cloud computing. Others are looking to move into commercial markets and outside the ... | ||
How to Fight Against Cyber Attacks Big Think When the American cybersecurity company McAfee announced it had traced a series of cyber attacks against corporations and governments to China's mainland, the specter of cyber warfare drew still closer after independent attacks from hacker-activist .. | ||
Hackers Say They Obtained US Police Information Latin American Herald Tribune The six-page document, prepared by the National Cybersecurity Communications and Integration Center, or NCCIC, recommended at the time that given the expertise of cyber-pirates, the authorities should “adjust monitoring of both internal and external ... | ||
Upcoming ARC Events for Business & IT Executives ARC Advisory Group In addition, dedicated workshops will focus on the specific issues surrounding cyber security and functional safety, process safety, energy efficiency, and anti-counterfeiting in the process and hybrid industries. The Cyber Security and Functional ... | ||
Force 3 Named Premier Velocity Partner by EMC PR Web (press release) Force 3, delivering innovative data center, collaboration, networking and cyber security solutions, announced today that EMC Corporation has named the company a Premier Velocity Partner. The Premier level partnership will further enhance Force 3's ... | ||
Govt wants to monitor Facebook, Twitter Times of India ... said in written reply to a question on Friday in the Rajya Sabha that DoT has received a letter from MHA to ensure monitoring of social networking websites like Facebook and Twitter in order to "strengthen cyber security paraphernalia". ... | ||
| ||
Stopping threats like Operation Shady RAT GigaOm 7, 2011, 9:00am PT 1 Comment Earlier this week, McAfee published information about a new cyber security threat it dubbed “Operation Shady RAT”. Operation Shady RAT, and others like it that have emerged over the past months, represent a new kind of ... | ||
| ||
choc-a-block with security breaches The Australian But as well as imaginary rock bands that Defrag just made up, we're also not one for actual hyperbole, which is why you will know how serious it is when we tell you that the time to panic about cyber security is now. And you should probably continue to ... | ||
Anonymous are script kiddies, says DHS FierceGovernmentIT Likely targets include the federal government and critical infrastructure sectors, "particularly in response to publicized events relating to civil liberties, cyber security, or allegations of censorship (online or otherwise)." | ||
Supporting innovation and growth in the IT industry The Hill (blog) Recently, as our membership gathered in Washington, DC for our annual conference, we brought particular focus to two innovation-intensive, high growth areas within the broader technology discussion: health IT and cybersecurity. ... | ||
Data and Inference: They'll Drink Our Milkshakes Huffington Post (blog) The work of a team at Carnegie Mellon presented yesterday at the annual cybersecurity conference Blackhat in Las Vegas unveiled the modern day parallel to the early oil industry in the United States with a talk on facial recognition technology and its ... | ||
Panetta Invokes Pearl Harbor While Anonymous Calls for Revolution Nextgov These are daily occurrences," James A. Lewis, a cybersecurity specialist at the Center for Strategic and International Studies told a House committee in May. Still, Panetta seems very worried about the future threat. At his June Senate confirmation ... | ||
Photos show the cultural difference between Black Hat and Defcon hacker events VentureBeat But he crossed into the realm of white hats when he joined the Pentagon's Defense Advanced Research Projects Agency as program manager for cyber security. In a Black Hat keynote, he announced that the government plans to invest in hundreds of small ... | ||
Undercover Facebook investigator highlights dilemmas in keeping children safe ... Naked Security by Paul Ducklin on August 8, 2011 | 2 Comments Australian Murdoch-owned tabloid the Herald Sun, published in Melbourne, Victoria, today reports on a thought-provoking war of words between two Victorian cybersecurity consultants. ... | ||
Risk managers, IT staff need to work together Business Insurance based trade association Internet Security Alliance, said, “There has been obviously an effort to call attention to the gap (between risk and IT managers) and to advocate for a more enterprise wide risk management approach to cyber security, ... | ||
Five Year Cyber-Spying Campaign, Black Hat, Lead Week`s Security News eWeek An official from the Defense Advanced Research Projects Agency announced the new Cyber-Fast Track project which will fund 20 to 100 new cyber-security projects. The projects should be small, quick to execute and ideally something that would benefit the ... | ||
Recent Cyber Attacks Against Federal IT Prompts Lumension and Security Expert ... Benzinga In response to today's seemingly endless attacks, Congress has introduced the Cyber SecurityPublic Awareness Act of 2011, but more evolution of government agency cyber defenses needs to occur. In an effort to offset the growing numbers of attacks, ... | ||
Video from Siemens and Synaptic Digital: Boeing, Siemens Form Strategic ... PR Newswire (press release) The Siemens and Boeing alliance brings together the capabilities required of a DOD energy modernization provider, including end-to-end engineering and construction; network and smart grid integration; cybersecurity; energy efficiency; energy management ... | ||
Hackers steal $1 billion a year from midsize banks, but account holders lose Washington Examiner I., who headed a Select Committee on Intelligence task force on US cybersecurity in 2010. The accounts typically aren't covered by insurance as individual accounts are. "If everyone knew their money was at risk in small and medium-sized banks, ... | ||
Cyber Security Conference 2011 | Financial Services By admin In the break out session, Mark will discuss some of the potential security problems that inter-disciplinary research on cyber security confronts. Participants will be encouraged to discuss the future of cybersecurity and the problems of ... Financial Services | ||
Black Hat Organizer Touts Value of Publicizing Cyber-Security ... By cybermaryland Organizations and international governments are now more aware of the necessity of cyber-securityand are exerting a more concerted effort to protect core Internet infrastructure, Black Hat founder and director Jeff Moss said as he welcomed ... Touts Value of Publicizing Cyber-Security Researchhttp://wp.me/pP73x-o5 0 minutes ago; RT @FedNewsRadio: Hacker conference features 'Meet the Federal Agent': Federal agencies have been been recruiting cybersecurity ex... ht . ... CyberMaryland |