National Cyber Security Alliance to Coordinate Data Privacy Day


National Cyber Security Alliance to Coordinate Data Privacy Day
PR Newswire (press release)
24, 2011 /PRNewswire-USNewswire/ -- The National Cyber Security Alliance (NCSA), a non-profit public-private partnership focused on cybersecurity awareness and education for all digital citizens, today announced that it will organize and lead efforts ...
Northrop Grumman to Showcase Cybersecurity and C4ISR Innovations at the U.S. ...
MarketWatch (press release)
At booth 821, Northrop Grumman is featuring programs and systems that demonstrate innovative solutions ranging from cybersecurity to C4ISR, which include the Battlefield Airborne Communications Node (BACN); the Army Knowledge Online/Defense Knowledge ...
Panel: Compliance does not create cybersecurity
FierceGovernmentIT
Agency CIOs are consumed with compliance and check boxes rather than focused on cybersecurityand risk management, said a AUg. 23 panel of cybersecurity experts. "Compliance is my worst nightmare," said David Stender, associate chief information ...
(ISC)² offering grants to encourage women to take up cybersecurity careers
Computer Business Review
The cyber security training training organisation International Information Systems Security Certification Consortium (ISC)² is offering scholarships to encourage more women to plug skills gap identified in a report earlier this year. ...
Cyber Security Issues Impact Small and Medium Businesses
Business Wire (press release)
... or cost prohibitive, and whose flexibility better stands the latest cyber threats and those to come,” Conner wrote in his August 18 th , 2011, Valley News Group guest editorial in Los Angeles, Cyber Security: The Futility of Finger-pointing. ...
Scholarships aim to encourage women to pursue cybersecurity careers
SearchSecurity.co.uk
According to Judy Baker, director of the Cyber Security Challenge UK, a competition created to encourage new people to join the industry, only 8% of entrants last year were women, and the proportion so far this year is even lower. ...
Cybersecurity: How can I steal from Thee? Let me count the ways.
Foreign Policy (blog)
Partly this is because I was at the same workshop on cybersecurity that David Ignatius summarized in a recent column. And partly it is because I keep reading stories like this one in Vanity Fair or this Washington Times piece or this one in the LA ...
The readers always write — and sometimes they rant
Urgent Communications
Last week, Mary Rose Roberts wrote a column on cybersecurity, in which she reported that mission-critical entities — such as the nation's 911 system, air-traffic control system, transit systems and power grids — are at greater risk than ever before, ...
Exploring Cyber Security - The Open Source Way!
EFYTimes (press release)
Cities like Bengaluru, Ahmadabad, Delhi, Ludhiana and Pune, among others, reported high incidence of cyber crime cases under the IT act with a total of 145 of the 178 cases--accounting for more than three-fourths of the total cases. ...
Dell spent $650000 lobbying the government in 2Q
BusinessWeek
Computer maker Dell Inc. spent $650000 lobbying the federal government in the first quarter on electronic waste exports, cyber security and other issues, according to a recent disclosure report. That's down 6 percent from the $690000 the company spent ...
Medical-device users worry they could face cyber-attack | The Republic
The Republic
By Janet Moore Star Tribune (Minneapolis) MINNEAPOLIS — Hundreds of cyber-security geeks watched recently as Jay Radcliffe stood on a Las Vegas stage and hacked into his own insulin pump, disabling its life-saving therapy. ...
Professor Bambauer on Hacking, Cybersecurity: Video
Bloomberg
Aug. 23 (Bloomberg) -- Derek Bambauer, law professor at Brooklyn Law School, talked with Bloomberg Law's Spencer Mazyck on Aug. 22 about recent high-profile security breaches and legal responses to protect consumer data. (Source: Bloomberg)
Recruiting and developing the 21st century cyber warrior
SC Magazine US
Last month, US Deputy Secretary of Defense William Lynn III announced that the Department of Defense (DoD) was releasing a cybersecurity strategy explicitly recognizing cyberspace as a new and official warfare domain. The Pentagon's strategy outlines ...
Cybrix Group Grows Over 3758%, Places 55th on 2011 Inc. 500 List
PR Web (press release)
The idea at the beginning—eight years ago when we started this company—was to be totally unknown to the world outside of Special Ops. Cybrix Group, a cyber-security and technology services firm, announced that it's been recognized for the first time ...
Record Breaking Quarter in Global Security Blighted by Declining VC Investment
Newswire Today (press release)
From a sector perspective, cyber security accounted for $1.1 billion of venture capital investment, representing 58% of total VC investment in 2Q11. “Cyber security continues to attract the venture capital community,” commented Douglas Lloyd, ...
Android Becoming Prime Target for Malware Makers
PCWorld
... 10:21 AM Attacks on Android by malware writers have jumped by 76 percent over the past three months, making it the most assaulted mobile operating system on earth during the period, according to a report by cybersecurity solutions maker McAfee. ...
Malaysia releases information security guidelines for SMEs
FutureGov Magazine
By Clarice Africa | 24 August 2011 The Cybersecurity Malaysia, an agency under the Ministry of Science, Technology and Innovation, has recently released a set of information security guidelines for SMEs in order to promote awareness and understanding ...
5 Top Trends Redefining CSO Priorities
CSO (blog)
The role of government in cybersecurity is nothing new to the CSO who is already working to ensure compliance with regulations by the Securities and Exchange Commission, Sarbanes-Oxley, HIPAA, the European Union Data Protection Act and others. ...
"Cyber Attack" -- Why It's Not a Great Phrase (But We're Stuck With It)
Huffington Post
For example, in the past week the Chinese cyber security watchdog has claimed China was attacked nearly half a million times last year. It sounds fantastically sci-fi, and I can see why journalists in particular like it. But "cyber attack" is a really ...
SAIC wins San Diego airport job
Bizjournals.com
The design-build contract will last 30 months. SAIC (NYSE: SAI) had $2.69 billion in fiscal first-quarter revenue, led by gains in cybersecurity and intelligence contracts. Jeff Clabaugh covers general assignment and provides business coverage for WTOP.
Government to invest €15m in SFI projects
Insideireland.ie
Among the projects being funded include cutting-edge research related to optical sensors, energy/solar cells, cyber security, renewable gas, high-speed wireless communication interfaces and an integrated volcanic ash forecasting system. ...
Experts Say Need-to-Know Should Trump Security Clearance
Security Management
The comments were made at a panel during Shake It Up, a MeriTalk Innovation Nation Forum to discuss cybersecurity and cloud computing strategies for businesses, at the Walter E. Washington Convention Center. Sensitive information should be looked at to ...
CSARN delivers business continuity and security advice in lead-up to London 2012
Info4Security
Threats, risks and opportunities across social media to business (and the advent of countering fraud and terror funding through 'wargaming') are covered by CSARN's experienced cyber security trainer and advisor to UK and international police forces. ...
US Army Awards Multi-Year Agreement to TeleCommunication Systems
TMC Net
They are also experts in cyber security services. Government organizations utilize TCS expertise incyber security expertise, professional services, and their highly secure satellite communication solutions for highly mission-critical communications. ...
When hackers become The Man
CNET (blog)
Another hacker role model who is having a very direct impact on US cyber securitypolicies and funding is Peiter Zatko, who was better known as "Mudge" when he was a member of The Cult of the Dead Cow (CDC) and L0pht hacker groups in the 1990s. ...
StrikeForce Technologies Reports on State of the Company
MarketWatch (press release)
Our management believes that consumer Internet users and enterprises are experiencing a heightened awareness of cyber security risks, resulting in more stringent security guidelines, regulations (eg FFIEC, HIPPA) and requirements. ...
Corero Selects Spirent's Security Testing Solutions to Address Cyber Security ...
TMC Net
Leveraging Spirent TestCenter and Spirent Avalanche to validate the effectiveness of its solutions, Corero will benefit from a broad range of test scenarios for cyber security. Testing across Layer 2-7, Spirent TestCenter and Spirent Avalanche enable ...
Bit9's Adaptive Application Whitelisting Technology Now Integrated with ...
MarketWatch (press release)
Bit9's Parity Suite's adaptive application whitelisting solution protects organizations from  modern cyber security threats. It accomplishes this through continuous monitoring of all software and portable storage devices running physical or virtual ...
Facebook Changes Aimed at Improved Privacy
PCWorld
As good as the new changes are, Facebook missed a real opportunity to advance privacy on its network, says Graham Cluley, a senior technology consultant with Sophos, a cyber securitysoftware maker. "A lot of these things are quite cosmetic," Cluley ...
a Theme for Up or Down Days
CNBC.com
For a straight-up physical security play, Cramer has his eye on American Science and Engineering As more and more sensitive information gets stored online, the market for cyber security grows. In this space, Cramer recommends Verint To capture both the ...
Why Doesn't Anyone Want to Shout About Cyber Attacks?
Huffington Post
From our estimates of the cost of cyber crime in the UK (cost to business of approximately £21 billion per annum) and what we see in our cyber security work, we suspect that many organizations are under cyber attack. Targets of particular interest are ...
Industry Perspectives on Army Needs
Signal Magazine
Michael Papay, sector vice president, cybersecurity, Northrop Grumman Information Systems, suggested that the Army and industry go beyond defensive maneuvers to understand how the offensive works and then build battlefield systems and subsystems that ...
Smartening the power grid
Times of India
Working groups to examine piloting new technology, measuring loss reduction and theft through data gathering and analysis , improving reliability, set interoperability and collaboration standards and manage physical and cyber security have been set up. ...
SRI International and the National Disaster Resiliency Center Partner to ...
PR Newswire (press release)
SRI also has homeland security programs focused on maritime and port security, military and first responder interoperability training, cyber security, disaster resiliency, interoperable communications, and biometrics. The NDRC plans to integrate ...
Homeland Security Today: TSA Improves Wireless Cybersecurity After ...
TSA Improves Wireless Cybersecurity After IG Audit. By: Mickey McCarter ... patch and configure software on its wireless networks to improve cybersecurity...
www.hstoday.us/.../bfbb824d3c2fac205ac7abcfe8fd2988.html
G&B wins cybersecurity contract - UPI.com
The U.S. government has given G&B Solutions Inc. a new blanket purchase agreement forcybersecurity services.
www.upi.com/Business_News/.../UPI-91661314100383/

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com