London's City University tackles cyber security threats with opening of cross ... Info4Security The new Centre for Cyber and Security Sciences will unite researchers from an array of backgrounds to examine what is now a complex cyber security landscape, as Brian Sims reports. By Brian Sims City University in central London has launched a ... | ||
Education is needed to tackle security Record-Searchlight Cyber security for businesses is more than just setting up a secured network. It also requires education and training for both the owner and employees. With the growing threat of Internet and virus crimes, businesses need to assess their risk factors ... | ||
Botnets descend from the skies msnbc.com Dietrich is a cyber security expert who built a proof-of-concept drone that can build a network of compromised computers, called a botnet, by hacking wireless connections to get access to computers. Botnets perform activities such as distributed ... | ||
Oyster Creek Spent Millions On Post 9/11 Upgrades Patch.com In 2001, shortly after 9/11, the NRC issued an advisory to power plants regarding the need to enhance cyber security. It also issued a guidance document to nuclear power plants on cyber security self-assessment methods in 2004. ... | ||
Thoughts on 9/11 and Cyberthreats GovInfoSecurity.com (blog) 11, 2001, terror attacks and their impact on how the federal government approaches cybersecurity. Fears of a cyber 9/11 focus, not on a terrorist organization, but on a nation-state seeking to disrupt our key information networks, banking systems or ... | ||
| ||
TVA Browns Ferry on alert WAFF There more personnel, stronger cyber security, more restrictions and limited access. They have additional fencing, gates at entrances, new security doors and locks on doors that weren't previously locked. TVA said they have acted on lessons learned ... | ||
Scott Tilley: Three technical areas undergo major changes in decade since 9/11 Florida Today I'll leave the socio-political commentary to others and focus instead of three technical areas that have changed significantly in the last decade: social media, physical security and cyber security. In an excellent article for the Wall Street Journal ... | ||
Deterrence in Cyberspace: Debating the Right Strategy with Ralph Langner and ... Brookings Institution A range of recent cybersecurity incidents has prompted much discussion on what might be done to head off the threat of devastating cyberattacks. Yet, the issue remains little understood by both policymakers and the public. On September 20, the 21st ... | ||
9/11 Ten Years Later: GovCon Impacts govWin (blog) The federal government has spent so much on security, cybersecurity and two wars that the media struggles just to count the money – and much of it has contributed to massive growth in the contracting industry. Political debates in Washington now center ... | ||
White House Seeks Tougher Penalties for Hacking, Cyber-Crime eWeek The proposal was based on the White House's cyber-security plan unveiled in May. The administration is also asking for updates to the Computer Fraud and Abuse Act so that cyber-crimes can be investigated and prosecuted as organized crime as defined ... | ||
Do you have a password? Washington Technology Cybersecurity, health care informatics, cloud computing, mobility, unmanned aerial vehicles and nation building, are growth areas and offer enormous opportunities. As an executive search firm, we have the unique opportunity to interact with a multitude ... | ||
FCC Seeks to Measure Impact of VoIP Signal Magazine Jeff Goldthorp is associate chief for cybersecurity and communications reliability with the FCC's Public Safety and Homeland Security Bureau. He says the primary goal is to make sure his agency has the regulatory tools available to track problems with ... | ||
FBI probes hacking of NBC News' Twitter account msnbc.com The US government official who specializes in cyber security said that a typical scenario for such an attack would be enticing a Twitter user — through a phony email — to download an attachment that contains a "keylogger Trojan" — a form of computer ... | ||
Little bunches of stuff in here! The Columbian ... Holdings — along with the state of New Mexico — is planning to build a 20-square-mile small city to test stuff like renewable energy innovations, intelligent traffic systems, next-generation wireless networks and smart-grid cyber-security systems ... | ||
UW 9/11 panel: We're safer but still vulnerable The Seattle Times By contrast, a panel on cybersecurity said the US cyber-infrastructure has never been so vulnerable to attack than it is now. Cheri McGuire, a vice president at Symantec Corp., which markets Norton security software, said that 10 years ago the biggest ... | ||
Tech-Testing Ghost City Comes Straight Out Of Sci-Fi Escapist Magazine Pegasus Global Holding, the Washington, DC company funding the project, said the ghost town could be used to test wireless networks, renewable energy advancements, smart traffic systems, and smart-grid cyber security systems (Read: Skynet). ... | ||
Terrorist Attack In New Delhi Voice of America ... for greater information-sharing and the sharing of best practices in the areas of investigations, forensic science, countering terrorist finance, cyber security, mass transit and rail security, port and border security, and maritime security. ... | ||
I-Team: Police Try to Stay One Step Ahead of Terrorists KLAS-TV "Nobody thought about cybersecurity five years ago, let alone 10 years ago," said Lawrence Casey, former administrator with the Homeland Security Commission. Casey is a former administrator with the Nevada Homeland Security Commission, ... | ||
The Day That Changed the Decade: Remembering September 11, 2011 Government Technology (blog) We received a large part of our grant funding for cybersecurity protections from this new security focus in DC. We built a team to defend our government Internet activity and safeguard sensitive data. At the same time, I watched as my niece, ... | ||
| ||
Qosmos Closes €19.8 Million Funding Round with DFJ Esprit, FSI and Alven Capital TelecomTV Qosmos' customers are Network Equipment Providers, Software Vendors and Systems Integrators in the telecom, networking and cybersecurity markets who embed Qosmos NI technology to better manage, track and monetize the massive increases in business and ... | ||
| ||
Data Breaches Show Hospitals Not Ready For Shift To Electronic Records ... Huffington Post It was one of many recent data breaches to occur in the health care industry, highlighting laxcybersecurity measures taken by hospitals and their contractors, experts say. "The health care industry has under-invested in security for years," said Bryan ... | ||
Homeland security funding slowly drying up Louisville Courier-Journal ... than $352 million in federal emergency management and anti-terrorism grants since 2002 that were used for planning, organization, equipment purchases, training and administration, along withcyber-security and infrastructure protection programs. ... | ||
San Diego blackout highlights infrastructure vulnerabilities Computerworld Often cyber security analysts tend to view threats to the power grid in the same way they view threats to information networks, he said. Any incident that results in an industrial control system being taken offline because of something happening ... | ||
US Senator wants to protect users from hacking Inquirer Cyber security is a hot topic in the US Congress, and the White House has been involved in recent discussions regarding online privacy legislation. Blumenthal also critcised Sony's inept handling of the attacks on its servers earlier this year that put ... | ||
NATO seeks India''s coop in countering cyber threats from China IBNLive.com PTI | 09:09 PM,Sep 09,2011 Seeking a partnership on matters relating to cyber security, the official pointed out that India and NATO had already reached at a tactical level understanding in dealing with piracy and shared a strategic level understanding ... | ||
| ||
Senate panel would restore partial funding for DHS projects FCW.com $450 million for cybersecurity efforts, an increase of $87 million above fiscal 2011. $297.4 million for the US-VISIT program, $36.5 million below fiscal 2011. Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT ... | ||
| ||
| ||
Homeland Security is Economic Security Security Debrief We need cyber security engineers at an unprecedented level to respond to the inherent weaknesses in our cyber networks. Every day, citizens and companies are at significant risk to financial loss from cyber attacks, and the overwhelming majority of ... | ||
| ||
K Street Files: New Campaigns Are Anti-Counterfeit, Pro-Can Roll Call (subscription) As senior counsel and senior policy adviser to Reid, Castellano focused on international trade, intellectual property rights and cyber security, among other areas. His previous jobs included Democratic trade counsel on the House Ways and Means ... | ||
| ||
NATO seeks India's coop in countering cyber threats from China ... While the United States has already signed a cyber security collaboration with India this July, the 28-nation political and military alliance is of the view that it can collaborate with it in protecting its cyber systems. Firstpost | ||
Former DHS Cybersecurity Chief Reitinger Named Sony CISO ... Former Department of Homeland Security (DHS) cyber-security chief, Philip Reitinger, has been named as the new executive vice president and Chief ... threatpost.com/.../former-dhs-cybersecurity-chief-reitinger-na... | ||
UM and MIT Lincoln Lab Partner on Cybersecurity MIT Lincoln Laboratory's three-year partnership agreement with UMD's Maryland CybersecurityCenter (MC2, or MC-squared) will focus on collaborative ... www.eng.umd.edu/html/news/news_story.php?id=5957 |