Securo-boffins call for 'self-aware' defensive technologies Register Participants at the inaugural World Cyber Security Technology Research summit also reckoned figuring out how to protect smart grids and mobile networks should be top research priorities, according to their report. Smart utility grids have, ... | ||
Company directors sidestep cyber security Insurance Daily Within the financial sector only one example was found of a state of the art cyber security messaging strategy and the think tank notes that such strengths seemed to be “heavily dependent upon the innovation and energy of the managers who introduced ... | ||
Australia cyber security being targeted by organised gangs iTWire By Marina Freri A new study on cyber threats today predicted the cyber security market, in Australia and in the whole Asia-Pacific region, would thrive as organised gangs targeted companies and governments within the region. ... | ||
Nations call on UN to discuss cyber security China Daily By Wu Jiao and Zhao Shengnan (China Daily) BEIJING - China, Russia, Tajikistan and Uzbekistan on Monday submitted a draft code of conduct for information security, the first of its kind in the field, for discussion during the upcoming United Nations ... | ||
How India can strengthen its cyber security Einnews Portugal Experts around the world view Indian cyber security and awareness as weak. From Mumbai, security consultant Vijay Mukhi said: "In terms of cyber security, India is one of the most vulnerable countries in the world. I know of many hacking cases in the ... | ||
UK cyber security plan delayed till October Register By Brid-Aine Parnell • Get more from this author The UK government's Cyber Security Strategy publication for this year is now expected in mid-October, after being delayed until after the party conference season. The Minister for Cyber Security, ... | ||
| ||
EU cybersecurity agency Enisa publishes report on app store security ComputerWeekly.com European Union cybersecurity agency Enisa has published a report on app store security that advocates a baseline set of five lines of defence against malware. Popular app stores such as Google Android Market and Apple App Store are used to deliver ... | ||
ESET NOD32 Antivirus 5 CNET Called "Cybersecurity Training," the module features an interactive city that you can explore to learn about how to protect yourself, your personal data, and your computer when online. It's an in-depth approach that we wish other vendors would take, ... | ||
Applying New Mathematics for Robust Cryptography and a Safer Internet PR.com (press release) To advance the field of cryptography, Dr. Nicolosi and his partners are capitalizing on recent developments in combinatorial group theory (CGT), which presents a new mathematical framework forcybersecurity. Unlike algebraic approaches, in CGT the ... | ||
Alexander Cites Need for Greater Cyber Defenses Department of Defense “Cyber [security] is a team sport,” Alexander said. “We have to work within the Defense Department as a team, and the Defense Department, with other agencies as a team, … and we have to strengthen our public-private partnerships. ... | ||
Companies with Poor Cyber Security May Be Missing Link in Personal Identity Theft Associated Content COMMENTARY | Cyber-criminals be advised: Personal Identity theft is out of fashion. At least that's what a recent report from information security think tank GodaiGroup suggests. Apparently there is a huge lapse in security when it comes to companies ... | ||
Skybox Security Announces Record Sales Growth for First Half 2011 MarketWatch (press release) SAN JOSE, Calif., Sep 14, 2011 (BUSINESS WIRE) -- Skybox Security today announced record sales growth for the trailing six month period ending June 30, 2011, positioning the company as the leading provider of cyber security management solutions for ... | ||
State hearing to address smart meters and privacy concerns Brattleboro Reformer By HOWARD WEISS-TISMAN / Reformer Staff BRATTLEBORO -- The state will be holding an interactive hearing Thursday night to collect input from the public on issues related to privacy and cybersecurity as Vermont utilities prepare to install high tech ... | ||
Merlin Awarded Five-Year Cyber Security Contract With Department of Health and ... Review seeker (press release) Bringing Highly Credentialed Cyber Security Technical Experts to Provide Security Operations Center (SOC) Support, IT Security Threat Analysis, Digital Forensics, Systems and Network Engineering Support Services By marketwire VIENNA, VA -- (Marketwire) ... | ||
US health care flawed, needs reform now UNM Daily Lobo The 2011 Domenici Public Policy Conference, held on the NMSU campus in Las Cruces last week, brought together experts on America's national debt, economic outlook, national and cyber security, science, technology and health care reform to discuss ... | ||
CORRECTING and REPLACING Accuvant Launches Advisory Board MarketWatch (press release) Today, Riley serves as the senior fellow in cyber security for Virginia Tech, and as an affiliated faculty member with the Ted and Karyn Hume Center for National Security and Technology. -- Dr. Bhavani Thuraisingham, Professor, University of Texas at ... | ||
Kratos to Present at Briley's Optical Defense & Cybersecurity Conference in ... Review seeker (press release) By Globenewswire SAN DIEGO, Sept. 13, 2011 (GLOBE NEWSWIRE) -- Kratos Defense & Security Solutions, Inc. (Nasdaq:KTOS), a leading National Security Solutions provider, today announced that its President & Chief Executive Officer, Eric DeMarco, ... | ||
DSEi: UAE to Acquire EADS Cybersecurity System DefenseNews.com (subscription) By PIERRE TRAN LONDON -EADS has won a contract with its joint venture partner to supply its Ectocryp cryptographic product for the United Arab Emirates (UAE) armed forces command-and-control system, said Hervé Guillou, head of cybersecurity at the ... | ||
Car Stolen From Military Man Serving Overseas W*USA 9 And now, a new threat may be emerging in the cyber-security world: high-tech hackers that are making newer model cars vulnerable. A Maryland family suspects that is how it was victimized. Daphne Northan said, "Initially, I was really, really hurt. ... | ||
Photons: The Future for Secure Computing? Sci-Tech Today By Beate Depping A professor of quantum optics at the University of Paderborn thinks the future of cybersecurity involves the special properties that light exhibits. Christine Silberhorn makes use of the principles of physics to make it impossible for ... | ||
| ||
Worrying cyber crime trends in S'pore TODAYonline by Tan Weizhen SINGAPORE - In Singapore, a whopping one-fifth of the population fell prey to cyber crime, last year, an inaugural study by cyber security company, Norton, has revealed. More than 1.2 million people here suffered US$195m in financial ... | ||
ESET Launches Fifth Generation of Flagship Products: ESET NOD32 Antivirus 5 ... MarketWatch (press release) Cybersecurity Training -- The training addresses cybersecurity concerns that were highlighted in a recent online survey conducted by Harris Interactive on behalf of ESET from August 25-29, 2011 among 2202 adults aged 18 and over. ... | ||
Mexican 'Twitter terrorism' case on the verge of collapse MetroNews Canada Fidel Ordonez told Metro that none of the experts from the Office of the Attorney General of Veracruz, who reviewed the social media accounts of teacher Gilberto Martinez Vera and journalist Maria de Jesus Bravo Pagola, are qualified in cyber security. ... | ||
Misha Glenny: Hire the hackers! Exchange Morning Post (press release) Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? Underworld investigator Misha Glenny profiles several convicted coders from around the world and ... | ||
Government cyber systems attacked Herald Sun The document, which will help the Government create a cyber white paper next year, says cyber security forces have had to improve defence systems. Other organisations are also being hit hard, with major attacks costing Australian companies $2 million ... | ||
Report: IT outsourcing facing escalated security risks Supply Chain Digital A study put out by the Intelligence and National Security Alliance says that outsourcing in the IT sector poses escalating cyber security risks. The report by the INSA warns that federal authorities that have outsourced a large portion of IT services ... | ||
Robert P. Liscouski Joins Viscount Systems' Board of Directors MarketWatch (press release) He commanded over a $500 million annual budget and was responsible for coordinating authority over the protection of all sectors of the nation's physical and cybersecurity infrastructure, including energy, food, water, public health, transportation, ... | ||
Fordham Law Launches National Security Center New York Law Journal ... in 2003 and served as its executive director, began work on Monday at Fordham designing a program that will focus on research, policy work and public programs on issues related to terrorism, national and global security, including cyber security. ... | ||
Testimony of Secretary Janet Napolitano, Before the United States Senate ... TMC Net In November 2010, the Multi-State Information Sharing and Analysis Center, opened the Cyber Security Operations Center, a 24-hour watch and warning facility, to enhance situational awareness at the state and local level and allow the federal government ... | ||
ASIO chief spooked by cyber spies Sydney Morning Herald The declaration by Mr Irvine also comes as the government releases a public discussion paper designed to inform next year's cyber white paper - Australia's first attempt at an overarching cyber security strategy. Recent incidents such as the leaking of ... | ||
French network intelligence software vendor lands $28.5 million in funding Network World ... the growth of the company internationally, meet demand for advanced DPI capabilities among solution and equipment providers and explore new use cases for Network Intelligence technology in the telecom, enterprise and cybersecurity markets. ... | ||
CASSIDIAN's Groundbreaking ECTOCRYP Cryptograph... defpro HervĂ© Guillou, Head of Cassidian Cyber Security, said: “This deal is of strategic importance to Cassidian as UAE become the first members of the ECTROCRYP family beyond NATO. The award of this contract is a testament to the world class pedigree of ... | ||
| ||
Damballa Senior Threat Researcher to Brief Congress on Cyber Threats MarketWatch (press release) Bodmer's Congressional briefing will give members of Congress and their staffers a better understanding of how real world cyber criminals utilize US cyberspace and what countermeasures can be developed and maintained to ensure US cyber security. ... | ||
Senator to businesses: Protect data or pay InfoWorld "Philosophically, companies ought to be doing this already," says Mark Rasch, director ofcybersecurity and privacy consulting at Computer Sciences Corporation. "The devil is in the details with these laws. But there are a number of questions here. ... | ||
Cyber security awareness month By JBC GLOBAL – Next month is the National Cyber Security Awareness month. Just like the real world, the online world is full of nice people you meet and get along with. Just like the real world though, the online world is also contaminated with ... PC Tech Talk | ||
UK cyber security plan delayed till October | ManmadeMag The UK government's Cyber Security Strategy publication for this year is now expected in mid-October, after being delayed until after the party conference season. Manmade Mag RSS Feed | ||
International ICT Policies And Strategies: NATO Requests Cyber ... NATO Requests Cyber Security Cooperation From India. In the absence of international cyber crimes treaty and international cyber security treaty, the next best ... ictps.blogspot.com/2011/09/nato-requests-cyber-security.html | ||
Parents: Talk To Kids About Cyber Security - Video - WBAL Baltimore Parents need to have a talk with their children about staying safe online while away at school. Reporter Chris Clackum explains it's just as important as the birds ... www.wbaltv.com/video/29157643/detail.html | ||
Cyber Security Solutions for Government | NJVC NJVC's Cyber Security Solutions for Government protect valuable data and network infrastructure in support of national security mission requirements. ... www.njvc.com/cyber-security-solutions-for-government | ||
US-CERT Technical Cyber Security Alert TA11-256A -- Microsoft ... ... Related Resources · About Us. Search US-CERT: Go button customize. National Cyber Alert System Technical Cyber Security Alert TA11-256A archive ... www.us-cert.gov/cas/techalerts/TA11-256A.html |