Deterring attackers in cyberspace The Hill Raduege is a retired lieutenant general of the Air Force and former co-chairman of the Commission on Cyber Security for the 44th Presidency. He is currently a senior counselor of The Cohen Group and chairman of the Deloitte Center for Cyber Innovation. | ||
Information Security and Privacy Board Meet Cryptome.org ... --Discussion with Cybersecurity Coordinator and Special Assistant to the President, --Presentation on Security Automation and key focus areas, --Presentations on policies relating to national border database (National Vulnerability Database), ... | ||
Code red: the cyber spy threat Sydney Morning Herald In a cable from June 29, 2009, a Beijing-based State Department cyber security officer discussed the ''strong possibility the PRC is harvesting the talents of its private sector in order to bolster offensive and defensive computer network operations ... | ||
Global assaults on cybersystems mushroom New Mexico Business Weekly Alessandra Seazzu (standing) keeps an eagle eye on the cybersecurity tasks of University of New Mexico students Christopher Wallace (left) and Brandon Klein at the university's Information Assurance Research and Education Center in Albuquerque. ... | ||
NIST releases latest cyber guide for agency networks FederalNewsRadio.com The Commerce Department has issued the latest word on how to spot cybersecurity weaknesses in federal computer systems: It's called the "Guide for Conducting Risk Assessments," and it's been published by the National Institute of Standards and ... | ||
TIBCO Software's CEO Discusses Q3 2011 Results - Earnings Call Transcript Seeking Alpha What it was, was a cybersecurity deal. And so they're using us, the most secure parts of the government are using us for cybersecurity. And we believe that, in and of itself, is a huge opportunity, where we think it's applicable to the commercial ... | ||
From the man who discovered Stuxnet, dire warnings one year later MinnPost.com Funny thing is, all these control systems, if compromised, could lead to mass casualties, but we still don't have any significant level of cybersecurity for them. LANGNER: It will be costly to fix the vulnerabilities in industrial-control systems. ... | ||
Skadden, Arps, Slate, Meagher & Flom LLP | "Cybersecurity: What to Expect From ... Linex Legal (press release) (registration) A host of cybersecurity incidents this year, ranging from successful hacks into the systems of RSA, Lockheed Martin, Citigroup and Sony's Playstation Network, to McAfee's report of "Operation Shady RAT," a widespread, systematic program of cyber ... | ||
| ||
| ||
FTC relaunches cyber 'on guard' site FederalNewsRadio.com The FTC has also partnered with the Homeland Security Department and other agencies in the Stop.Think.Connect Campaign to raise awareness of the need for stronger cybersecurity with new approaches to help increase online safety and security. | ||
Federal Comm. Commission Proposes Rules for Determining VoIP Outage Effects ... The Open Press (press release) According to Jeff Goldthorp, associate chief for cyber security, FCC, the primary goal of the rule is to make sure his agency is laced with the regulatory tools available to track problems with the VoIP telephone systems and also check on the outages ... | ||
Apple sued over microprocessor patents; Mass. to investigate iTunes fraud Apple Insider Coakley revealed her own plight this week in statements made at an address to the Massachusetts Advanced Cyber Security Center. She said her office will be looking into the issue and "demanding answers" from Apple, which has not commented on the issue. ... | ||
Security lessons from the PlayStation Network breach VentureBeat In September, Sony hired former the director of the National Cyber Security Center at the US Department of Homeland Security Philip Reitinger to be its new chief information security officer (CISO). Organizational complacency was also an issue that led ... | ||
The Netizen Report: Governance Edition Global Voices Online Issues including cyber-security, diversity, freedom of expression, critical Internet resources, and the future of Internet governance will be discussed in Nairobi by delegates from all over the world representing governments, companies, the technical ... | ||
DigiNotar Files Bankruptcy And Mitsubishi Breach Security Pronews Cyber security is a world of its own. Until programmers become security experts or security experts are hired to overlook the work of programmers, the National Vulnerability Database (NVD) will keep pumping out vulnerability updates by the dozens. | ||
| ||
| ||
IT reforms moving to optimization stage FederalNewsRadio.com It covers governance, cybersecurity and commodity IT. You will hear a lot about commodity IT in the coming year." Commodity IT includes email, desktop software and other commonly used technology. In the end, Schlosser said the goal of the IT reform ... | ||
The dark side CanadianBusiness.com In this respect, hackers are the key to cybersecurity as they hold the solution to the conundrum. Find and understand the hackers, and you will have made serious strides toward uncovering the truth. The overwhelming percentage of funds that governments ... | ||
Citigroup Inc. (NYSE:C) Funding Fight Against Cyber Crime StocksandShares.TV Citigroup Inc. (NYSE:C)'s chairman of Venture capital initiatives Deborah Hopkins said, “As people manage more and more aspects of their lives on digital and mobile platforms, cyber security is only going to become more important. ... | ||
New England cybercenter opens Dalje.com The Advanced Cyber Security Center, an initiative of Mass Insight Global Partnerships, was opened Tuesday. The initiative enables operational, real-time data-sharing about advanced cyberthreats and establishes a platform for industry researchers to ... | ||
Sotera Completes the Acquisition of Software Process Technologies, Inc. Sacramento Bee ... revenue and its outstanding financial performance is driven by its unique solutions focus, leading edge technical expertise and direct exposure to programs addressing the pressing cyber security mission requirements of the Intelligence Community. ... | ||
Russia: Cyber Security Code of Conduct? · Global Voices By Alexey Sidorenko The year of 2011 has turned out to be a hot season for the Russian Ministry of Foreign Affairs (MFA): the government is attempting to spread the system of Internet controls abroad - and the Russian bloggers interpret these attempts as either a ... Global Voices | ||
The Online Trust Alliance Announces “Why Your Browser Matters” in ... By cybermaryland GAITHERSBURG, MD, Sep 22, 2011 (MARKETWIRE via COMTEX) — NIST CybersecurityEducation Workshop — The Online Trust Alliance (OTA) today announced “Why Your Browser Matters,” a framework for websites to create “teachable moments” for site visitors, raising awareness of the security, ... Help us assess the cyber security industry in the state, catalog the cyber securitywork being performed throughout Maryland, and identify available services and service providers. ... CyberMaryland |