Security Expert: US 'Leading Force' Behind Stuxnet NPR by Tom Gjelten One year ago, German cyber security expert Ralph Langner announced he had found a computer worm designed to sabotage a nuclear facility in Iran. It's called Stuxnet, and it was the most sophisticated worm Langner had ever seen. ... | ||
PwC Debuts Cyber Security Video Series on Fraud Forum Sacramento Bee 26, 2011 -- /PRNewswire/ -- PwC's Fraud Forum has launched a Cyber Security Video series featuring overviews and insight on the cybercrime landscape and in-depth discussions of what organizations can do to protect themselves from compromise. ... | ||
TRA organises cyber security workshops Khaleej Times The discussions focused on finding effective means to strengthen the cooperation between OIC countries on issues that threaten cyber security, in addition to providing a safe cyber environment for users. The delegation aims to protect users from cyber ... | ||
Seventy-Three Percent of Business Owners Have Not Tested Their Websites for ... MarketWatch (press release) NEW YORK, Sept. 26, 2011 /PRNewswire via COMTEX/ -- Newtek Business Services, /quotes/zigman/84238/quotes/nls/newt NEWT -1.48% , The Small Business Authority with a portfolio of over 100000 business accounts, announced today the findings of its SB ... | ||
Pershore's MP backs cyber security firms Evesham Journal CYBER security firms in Worcestershire that are keeping Britain's secrets safe need more government support, said a local MP. Harriett Baldwin, Mp for West Worcestershire, praised the work of Malvern's network of specialist technology firms during a ... | ||
3 Data Breach Bills Pass Senate Committee Insurance Networking News A bill that includes several cyber security proposals proposed this year by the Obama administration was approved by a Senate committee today. The Personal Data Privacy and Security Act of 2011, S. 1151, introduced by Sen. Patrick Leahy, D-Vt., ... | ||
Malaysia Encourages APEC TEL To Boost Cooperation In Cyber Security Bernama Secretary-General of the Ministry of Information, Communications and Culture Datuk Seri Kamaruddin Siaraf said such efforts were necessary as issues concerning cyber security and privacy were now becoming a major concern in most countries including ... | ||
Five Ways to Profit from Cybersecurity Stocks Money Morning Companies without in-house cybersecurity teams have been on the hunt for a good takeover target to bring such expertise on board. Intel Corp. (Nasdaq: INTC) about a year ago paid $7.68 billion to buy out McAfee Inc., a leading global supplier of ... | ||
University of Minnesota To Host Cyber Security Summit Campus Technology Barker is associate director and cybersecurity adviser to the Information Technology Laboratory at the National Institute of Standards and Technology. He plans, directs, and implements the institute's cybersecurity policies and programs, and implements ... | ||
| ||
Hackers may have had head start in Ottawa cyber-attack CTV.ca Last year the Conservatives announced a new cyber-security strategy, which set aside $90 million over five years, and $18 million in continuing funding toward beefing up existing systems. But the records suggest a request for better software that could ... | ||
DoD expands cyber-protection pilot DoD Buzz Also, the legislation should say that companies can be protected from certain privacy and other laws in order to share information with the government for cybersecurity purposes, the official said. Wow, candor! Usually cyber-security discussions at the ... | ||
Malaysia Urges APEC TEL To Intensify Cybersecurity Cooperation Bernama KUALA LUMPUR, Sept 26 (Bernama) -- Bilateral and multilateral cooperation among members of the APEC Telecommunications and Information Working Group (APEC TEL) needs to be strengthened to counter negative acts which threaten the stability of Government ... | ||
Cyber warfare defended through forensics Examiner.com Hoog admits that cyber security is an incredibly difficult challenge. “It probably should have been discussions we were having six, eight years ago, (and now) we're behind the eight ball.” But with forensics “there is a very, very interesting ... | ||
9-26-11: Tomorrow's Cyberdefenders Maryland Morning with Sheilah Kast Everyday, hackers hit government agencies and major corporations, and cybersecurity has become a bigger concern than ever. Governor Martin O'Malley's administration is trying to build acybersecurity industry here in Maryland. ... | ||
Feds Give Kundra "B" Grade -- Ask VanRoekel to Focus on Operations MarketWatch (press release) When it comes to cyber security, respondents unanimously agree threats have increased in the last year (100 percent say yes). Feds say the most important priorities for cyber security going forward are: securing Federal networks (68 percent), ... | ||
Hacking of arms firms worries Americans New Brunswick Business Journal "Cyber security must be a public-sector priority," US embassy spokeswoman Karen Kelley said. One industry source said Washington has been pressuring Japan to step up security against cyber assaults. The attacks on Japan's top defence contractor ... | ||
Most Canadians have been victims of online viruses: study Vancouver Sun The findings appear in a major study of the knowledge and attitudes of Canadians towards cyber-security and safety done for Public Safety Canada by Ekos Research Associates. A report on the survey of 5048 Canadians, dated August 2011, has just been ... | ||
Norman Delivers Powerful and Effortless Protection with New Security Suite 9 ... Sacramento Bee 26, 2011 -- /PRNewswire/ -- Norman today announced the availability of Norman Security Suite 9 for consumer personal computers, delivering unmatched cyber security protection with simplicity. Consumers are increasingly aware that a potentially ... | ||
| ||
Network Intelligence Alliance Sees Membership Increase as Demand for Embedded ... San Francisco Chronicle (press release) NI technology is critical for communications, business and security applications, such as network traffic optimization, policy management, service assurance, market research and network and cyber security. NI Alliance members are providers of ... | ||
On the Road with SenSage TMC Net ... (News - Alert) had a chance to sit down with Joe Gottlieb, President and CEO of SenSage, a company who helps organizations collect, store, analyze and interpret complex information to identify new threats and improve cyber-security defenses. ... | ||
747s as flying Unix hosts: SCADA in the sky Boing Boing By Cory Doctorow at 3:02 pm Sunday, Sep 25 From Craig S Wright, vice president of Global Institute for Cybersecurity + Research, a look at the use of SCADA systems that are connected to the Internet. You probably remember SCADA from the starring role ... | ||
The Government Model Wall Street Journal Responsible for protecting computer networks for 400 US embassies and offices across 24 time zones, State faces a cybersecurity challenge that in many ways mirrors that of a multinational company. Its program scans computers throughout the department ... | ||
| ||
Barracuda Networks expands presence in the Middle East AME Info Barracuda Networks' research scientists have been analysing the latest cyber security threats landscape and will be sharing new research into the latest threats affecting consumers and businesses in the Middle East. The number of malware found on a ... | ||
CSC touts cross-government security feed iT News According to CSC's cybersecurity services director Lawrence Ostle, the service could bypass organisational politics that hindered security in federated organisations like governments. He highlighted a NSW Audit Office report last October that found ... | ||
Next Generation MDM Unlocks Wealth of Smart Meter Data MarketWatch (press release) Guided by the Smart Grid Cyber Security standard (NISTIR 7628), the access control design of the Ecologic MDM provides a high degree of security from unwanted external access to smart grid assets through the MDM application. These access and security ... | ||
Coast Lines: Sept. 26, 2011 Santa Cruz Sentinel Topics include Middle East Realignment, Cyberwar and Cybersecurity, Exit From Iraq and Afghanistan, Obstacles to Promoting Democracy, Mexico, Indonesia, Oceans and Energy Geopolitics. The group will be led by Laina Farhat-Holzman, local author, ... | ||
CompTIA Washington Fly-In Will Provide Advocacy Forum for IT Solution Providers PR Web (press release) Discussion topics are likely to include health information technology; privacy; data breach notification; cybersecurity; workforce development; taxation; regulatory matters; access to capital; and government contracting opportunities for small IT firms ... | ||
You May Be Fighting the Wrong Security Battles Wall Street Journal Dr. Gordon and Dr. Loeb are professors at the University of Maryland's Robert H. Smith School of Business and the authors of "Managing Cybersecurity Resources: A Cost-Benefit Analysis". They can be reached at reports@wsj.com. ... | ||
Identity Ecosystem: Big Brother Logs On Rutherford Institute Touted by Howard A. Schmidt, President Obama's Cybersecurity Czar, for its convenience and so-called ability to enhance online trust and privacy, this Identity Ecosystem is yet another example of the collusion between government and corporate America, ... | ||
Hackers should be hired, TED speaker urges: is this the best path to online ... SmartPlanet.com (blog) As he put it: “Despite the fact that we are beginning to pour billions, hundreds of billions of dollars, into cybersecurity — for the most extraordinary technical solutions — no one wants to talk to these guys, the hackers, who are doing everything. ... | ||
Delivering on the Promise of Innovation to Help Prevent CyberBullying The White House (blog) We stand ready to assist in surfacing promising ideas, encouraging testing and validation, and scaling what works. Aneesh Chopra is US Chief Technology Officer and Howard Schmidt is the President's Cybersecurity Coordinator. | ||
Estonia - President Toomas Hendrik Ilves at ICEGOV conference (International ... ISRIA (registration) Cyber-security has is today's growth field, with no better testamonial than the fact that both NATO's Cooperative Cyber Defense Center and the European Union's Home and Justice affairs data centre are located here in Tallinn. ... | ||
BAE Systems looks to tap 'knowledge bank' Financial Times In 2008, for example, it spent £531m on Detica, a UK based company that specialises in data services and cyber security. And in the first half of this year it paid £177m for Norkom, which helps the financial services industry to combat money laundering ... | ||
Education in cyberspace security | | Aggie CentralAggie Central By AggieCentral Editor 15, Cameron's Department of Computing and Technology hosted a seminar about cyber security that focused on balancing technology, educating users and making policies to provide maximum information technology. The department ... Aggie Central | ||
Cybersecurity, An Introduction | Hoover Institution Editor's note: This essay is the first in a series of three articles by the author about cybersecurityand cyber warfare. Hardly a day goes by without news of some ... www.hoover.org/publications/defining-ideas/article/93736 |