US warns of 9/11, Hurricane Irene cyber scams
The Associated Press
New bulletins issued in recent days by the Homeland Security Department's cybersecurity center said computer users should be wary of emails with subject lines referring to the recent hurricane or 9/11, even if they appear to come from reputable sources ...
|
|
Federal Agencies Agree to Work Harmoniously for Cyber Security
DailyTech
Cyber security has become an increasingly important issue in recent years due to the number of attacks launched against corporations and governments around the world. For instance, hacker groups LulzSec and Anonymous as well as others have broken into ...
| |
|
Cybersecurity: The Industry With 0% Unemployment
DailyFinance
Yet almost every week I hear it from a friend who is an information security specialist (aka,cybersecurity tech geek). At just 25 years old, he's armed with numerous certifications that you and I have probably never even heard of. ...
|
The quest for an unhackable code
CNN
By David Goldman @CNNMoneyTech September 2, 2011: 9:13 AM ET The creators of Engima-DS, pictured above, say they've created an unhackable code -- but experts say good encryption is the least of our cybersecurity problems. NEW YORK (CNNMoney) -- Every ...
|
Where We Need to Be
energybiz
In January, GAO published "Electricity Grid Modernization: Progress Being Made on CybersecurityGuidelines, but Key Challenges Remain to be Addressed." The GAO said that NIST's August 2010 Interagency Report, "Guidelines for Smart Grid Cyber Security," ...
|
Cyber crime, still a priority
IDG News Service
"$10000, Expert, Please, Help, are some of the common words that compose emails used to lure innocent victims by cyber criminals" says Longe Oluminde Babatope, a cyber-security expert from Nigeria. Longe adds that most of these emails are rich in ...
|
Fighting cyber crime to combat budget crunch
Moneycontrol.com
As these companies chase fewer and smaller state and local government contracts, salvation for some may be in the growing commercial market for cyber security. A spate of high-profile online hacking attacks have pushed cyber security up the must-have ...
|
Where the Pentagon May Cut—or Spend
BusinessWeek
The electronics and cybersecurity budgets will grow By Roxana Tiron US Army and Marine Corps plans to buy a fleet of new armored trucks could be at risk. The Joint Light Tactical Vehicle program is estimated to cost between $10 billion and $30 billion,...
| |
|
Waging war on cyber crime
Wigan Today
It is already being used as a teaching tool in America's National University's MSc course in cyber security, and the company is in talks with the US Navy and San Diego Police Department about adopting Atlas Exchange too. What is called a Secure Managed ...
| |
|
Freezing PC? Your Computer Could Be Under Attack!
THISDAY Live
By Ogunleye George The need for cyber-security cannot be over emphasised, as most victims unknowingly invite these cyber-criminals. Surfing the net for softwares freebies, multimedia files (songs and videos) and games, has been the primary bait through ...
|
Nato seeks greater engagement with India
Times of India
... US-led military training mission in Afghanistan till 2024 and a post-conflict role in Libya, wants a deeper engagement with India in fields ranging from counter-terrorism and anti-piracy to cyber-security and ballistic missile defence (BMD). ...
|
WikiLeaks: Who released the trove of unredacted documents?
Alaska Dispatch
Whoever is responsible for making the cables freely available, this latest in a series of controversial document dumps stands as an important reminder of the difficulties inherent in cybersecurity in a digital age, say experts. And this security breach ...
|
Sector Snap: Government IT contractors downgraded
BusinessWeek
Booze Allen and SAIC, for example, do intelligence work for different defense agencies includingcyber security and software development. ICF International does policy assessments and market analysis for the government and private companies. ...
|
Cyber Attacks Down, Yet the Enterprise Still Faces Threats
IT Business Edge (blog)
With such conflicting messages, it's no wonder companies struggle with cyber security. Symantec has come out with its 2011 State of Security report, which found that seven out of 10 businesses were hit with cyber attacks over the past 12 months, ...
|
AMD spends $110K on second-quarter lobbying
BusinessWeek
based company lobbied Congress, the White House, the Defense Department, the National Science Foundation and other federal agencies on issues including cyber security, government funding for technology research, trade, taxes, immigration. ...
|
|
Security: Belden Acquires Canadian-Based Byres Security
Automation World
They say in a blog post, “BSI will continue: Contributing to the development of industrial cyber security standards.” Further, they note, “We will carry on leading Byres Security, with Joann as General Manager and VP and Eric as CTO and VP Engineering, ...
|
Integrating Communications
energybiz
The energy act of 2007 directed the National Institute of Standards & Technology to develop standards related to the smart grid's interoperability and cybersecurity. This year, the Government Accountability Office completed an audit of NIST and FERC ...
|
NICT discusses infotech vision
Calcutta Telegraph
Speaking on cyber security during the panel discussion, Ajay Goel, managing director of Symantec Corporation (India and SAARC), said 42 per cent of Indian enterprises rated cyber security as their top concern — over natural disasters, terrorism and ...
| |
|
|
Businesses Increasingly Under Attack From Cyber-Security Threats
Canada NewsWire (press release)
SAN JOSE, CA, Sept. 2, 2011 /CNW/ - SonicWALL, Inc., the leading provider of intelligent network security and data protection solutions, today issued its mid-year cyber-threat intelligence bulletin. The bulletin reveals that businesses are increasingly ...
|
SMART METERS: THE NEW SILENT KILLERS (Part 1 of 2)
Liberty News On Line
This initiative risks our finances, our health, privacy, cyber security, the ability of people with medical device implants to function and more. "If this radiation were a drug, increasing the dose and type would not be allowed without thorough ...
|
Guard facilities get upgrade
The News Journal
"Fundamentally, the Guard hires the same kind of experts we'd hire at a US corporation or university to protect the university or the company," said Chase Cotton, associate director for cybersecurity at the Center for Information and Communications ...
|
Film honoring Domenici debuts on final day of conference
Las Cruces Sun-News
On Thursday they addressed the national debt, cyber security and national security. Alice M. Rivlin, the former vice-chair of the Federal Reserve Board, said Thursday that pulling the country from its sinkhole of debt will require an immediate, ...
|
Rapid Fire: 2011-09-02
Defense Industry Daily
CACI completes its $61.5 million acquisition of cybersecurity and IT solutions provider Paradigm Holdings. France's Direction Generale de l'Armement (DGA) awards a consortium led by Alcatel-Lucent a 16-year contract worth €350 million ($500 million) to ...
|
Cassidian to maintain, repair simulators
UPI.com
Areas of expertise include air systems, land, naval and joint systems, intelligence and surveillance,cyber security, secure communications, test systems, missiles, services and support solutions.
|
What's been done for BRAC
Baltimore Sun
... the long-term benefits of BRAC to our state should not be overlooked: the creation of quality, high-paying jobs; improved transportation and educational opportunities; and the establishment of Maryland as the epicenter of cyber security. ...
|
Ten Years After 9/11, America's Safety Still in Doubt
CNBC.com
"Nine-eleven forced changes that made the US much safer in terms of intelligence gathering," said Ed Hammersla, COO of Ratheyon Trust Computer Solutions, a supplier of cyber security solutions for the government and private industry. ...
| |
|
Experts discuss terrorism, corruption at EFCC meeting
NEXT
... capital flight: threats to national development; securing the gateway to the global economy: cyber-security, mobile telephony and national development; using financial intelligence units to stem corruption, insecurity and terror,” Mr Babafemi said. ...
|
High profile breaches changing security concerns
eChannelLine
However, worry remains high around cyber security breaches, the survey also showed that executives are not doing enough to protect against unauthorized software and malware from infecting their desktops, laptops and servers. ...
|
Lungren: More debt ceiling debate to come
Elk Grove Citizen
The Congressman said the one area of security that is lagging is cybersecurity. He said this is not because of desire but due to the changing nature of the Internet and how organized crime and rogue nations are involved. “The private sector is far more ...
|
|
Regents to consider program cuts
UNLV The Rebel Yell
Also slated for elimination are various UNLV research centers including the Centers for Advanced Study of Algorithms, Cybersecurity Research, Disability and Applied Biomechanics, Sports Education, as well as the Cognitive Interference Lab, ...
|
|
Information security e-learning in line with ISO 27001 requirements
Einnews Portugal
E-learning is a proven technique in educating staff in fundamental information security principles, and it has the capacity to enhance any organisation's cyber security to protect it from falling prey to cyber attacks directed at stealing privileged ...
|
Edwards Angell Palmer & Dodge | Congressional Update - Fall Preview
Linex Legal (press release) (registration)
Throughout the course of this year, cyber security policy has been a prominent issue in Congress. In both chambers, committees of jurisdiction have held hearings and considered legislation aimed at modernizing the nation's protection capabilities ...
|
City University Creates Unit To Combat Cyber Threat
eWEEK Europe UK
The new unit will bring together experts from around the University, who are specialists in fields such as cryptography, software reliability, and network security, in order “to examine the complex cyber security landscape and the threats posed by both ... |
|
|
|