By VIVEK KUNDRA Published: August 30, 2011
AS the global economy struggles through a slow and painful recovery, governments around the world are wasting billions of dollars on unnecessary information technology. This problem has worsened in recent years because of what I call the “I.T. cartel.” This powerful group of private contractors encourages reliance on inefficient software and hardware that is expensive to acquire and to maintain." . . . . cloud computing is often far more secure than traditional computing, because companies like Google and Amazon can attract and retain cyber-security personnel of a higher quality than many governmental agencies.
Cybersecurity Focus Increasing as Organizations Adopt New Computing Models MarketWatch (press release) /quotes/zigman/78627/quotes/nls/symc SYMC +1.12% today announced the findings of its 2011 State of Security Survey which explored the state of cybersecurity efforts in organizations of all sizes. For the second year in a row, IT said security is the ... | ||
Kaspersky Lab Extends "IT Security for the Next Generation" Conference to the ... MarketWatch (press release) WOBURN, MA, Aug 31, 2011 (MARKETWIRE via COMTEX) -- Kaspersky Lab, a leading developer of secure content and threat management solutions and one of the world's leaders in cyber security, will expand its acclaimed international research conference, ... | ||
Suspected North Korean cyber attack highlights dangerous "mist and haze ... Indiana University BLOOMINGTON, Ind. -- Media reports of a suspected North Korean cyber attack against a South Korean bank raise fresh concerns about threats to cybersecurity. However, according to an Indiana University Maurer School of Law cybersecurity expert, ... | ||
| ||
| ||
NRC OKs N-plant's security program The Daily News of Newburyport By Angeljean Chiaramida Staff writer SEABROOK —The Nuclear Regulatory Commission recently approved a cyber-security plan for the Seabrook nuclear power plant meant to ensure the plant's protection against cyber attacks. According to the approval ... | ||
Industrial Control Systems Security PR Newswire (press release) What are the key ICS cyber security risks and vulnerabilities that are not adequately mitigated? • What are the technologies mostly like to be purchased to improve security of ICS and SCADA networks? • How large is the ICS cyber security market and ... | ||
Palo Alto's McLaughlin Says Hack Attacks to Get Worse Washington Post McLaughlin also discusses Palo Alto's firewall software and the outlook for corporate spending on cybersecurity. He speaks with Emily Chang on Bloomberg Television's "Bloomberg West." (Source: Bloomberg) (/Bloomberg) Correction: Clarification: SuperFan ... | ||
Software firm to open office Rochester Democrat and Chronicle The new location at 4 Commercial St. comes as Mykonos earlier this year announced a partnership with Rochester Institute of Technology to jointly teach cyber-security issues. "Rochester is a very strategic location for Mykonos Software, enabling us to ... | ||
Cimation to open 8000 square foot Denver Tech office Denver Post Klein said the Denver office will provide project management, communications design, control room management, cyber security as well as design and drafting services. Klein had been the instrumentation engineering manager at Audubon Engineering. ... | ||
Sotera Secures Over $15 Million in Cyber & C4ISR Contract Awards to Support ... MarketWatch (press release) ... solutions and services for national security agencies and programs of the US government, was recently awarded over $15 million to support several cybersecurity and C4ISR programs within the Space and Naval Warfare Systems Command (SPAWAR). ... | ||
The Intelligence Report On Mantech International istockAnalyst.com (press release) Cyber Security involves protecting military, law enforcement, health, and other critical and classified networks from security threats. Global Logistics is just what it sounds like - supply chain management, maintenance of vehicles and equipment, ... | ||
GAO: Conflicting orders have led to confusion over DoD's cyber strategy The Hill But help could soon be on the way in the form of a sweeping new cybersecurity strategy document being developed by the Joint Staff. It is called “Joint Test Publication 3-12,” and Pentagon officials say the document would consolidate guidance now ... | ||
Washtenaw: Cyber Security The Ann Arbor Chronicle By Chronicle Staff StaySafeOnline.org, hosted by the National Cyber Security Alliance, posts a Q&A with Washtenaw County commissioner Kristin Judge about the Washtenaw County Cyber Citizenship Coalition, which Judge spearheaded. ... | ||
| ||
It's official: Hacking has been gamified Washington Post (blog) With cyber-security fast becoming something of an obsession in Washington, US agencies are racing — sometimes against each other — to hire code-savvy youngsters. Recruiters from the Defense Department, the National Security Agency and the Department ... | ||
Tantus tapped for cybersecurity services UPI.com 31 (UPI) -- The US government has given Tantus Technologies Inc. a Blanket Purchase Agreement for cybersecurity services, the company announced. The agreement came from the US General Services Administration and the Department of Homeland Security. ... | ||
Second Opinion On Cramer's Homeland Security Call: Consider Check Point Seeking Alpha In my view, cyber security is a potentially more profitable subsector, one that benefits from private sector spending in addition to public. PC Magazine quotes a study that reports the costs associated with dealing with cyber crime went up 56% this ... | ||
Report Cites Unresolved Gaps in US Security Voice of America (blog) It expresses concern about cyber security, and says there is a pattern of increasing terrorist recruitment in the US of individuals who act alone, or so-called “lone wolves.” It does note however that there have been improvements with the screening of ... | ||
Tantus Technologies, Inc. Wins Blanket Purchase Agreement for Cybersecurity ... RedOrbit Tantus has a growing Information Security and Privacy Line of Business that has a proven track record of delivering Cybersecurity-related services. They are currently responsible for securing a range of mission critical data, systems, ... | ||
| ||
Top cybersecurity concerns: Malicious code, employees run amok PC Advisor By Ellen Messmer | Network World US | 31 August 11 When 3300 information-technology professionals were asked about cybersecurity, they said malicious code attacks accounted for the main type of cyberattack their organizations suffered during the past ... | ||
San Francisco's Mykonos Software to open office in Rochester Rochester Democrat and Chronicle The new location comes as Mykonos earlier this year announced a partnership with Rochester Institute of Technology to jointly teach cyber-security issues. “Rochester is a very strategic location for Mykonos Software, enabling us to gain access to a ... | ||
| ||
Booz Allen Hamilton Examines Evolution of Domestic Preparedness, Emergence of ... defpro Additionally, journalists are encouraged to: • Interact with cybersecurity tools and simulations from our Cyber Security Center. • Participate in the personal preparedness fair with local first responders, representatives from the American Red Cross, ... | ||
Estonia - President Ilves met with British Secretary of State for Defence ISRIA (registration) ... Toomas Hendrik Ilves discussed the continuation of the NATO air security mission in the Baltic states, military co-operation between Estonia and the UK in Afghanistan, joint ventures in the sphere of cyber security and the situation in Libya. ... | ||
Morning Tech Wrap: HP, Facebook, Sony Forbes Facebook has paid out more than $40000 in the last three weeks to cyber security “bounty hunters” who have found bugs in its software, The Daily Telegraph reports. The three-week old project that Facebook is calling its “Bug Bounty Program” has already ... | ||
Pentagon's cyber strategy is "confused" TG Daily Nevertheless, GAO analysts, Davi D'Agostino and Nelsie Alcoser say that a cybersecurity strategy document currently being formulated by the Joint Staff could help alleviate some of the confusion - if it is completed in a timely manner. ... | ||
WTPF – The Business Forum for HR Professionals Releases 2011 Compensation Survey PR Web (press release) New this year, the survey includes information for some of the hottest growth areas including Cyber Security and Geographic Information Systems. Key users say the survey is constructed and designed to really support the compensation market information ... | ||
| ||
UMBC Training Centers Named One of the 'Top Fastest Growing Companies' by Inc ... PR Web (press release) UMBC Training Centers reported 143 percent growth, largely attributable to increased training delivered to the federal government in areas such as cybersecurity, systems engineering and project management. Training Centers was founded in 2000 by UMBC, ... | ||
IEEE Xplore® Digital Library Reaches Three Million Documents as Pace of ... PR Newswire (press release) ... Mohsen Jafari, an IEEE member from Rutgers University, NJ; Paul M. Skare, an IEEE member from Pacific Northwest National Laboratory, and Kenneth Rohde from the Cyber Security Research and Development Department at the Idaho National Laboratory. ... | ||
| ||
Information Management Resources (IMRI) and H2 Clipper Announce Strategic ... MarketWatch (press release) About IMRI -- IMRI was founded in 1992 to provide private industry and government the highest quality technology, cyber security and engineering services. Headquartered in Aliso Viejo, CA, IMRI, a Service Disabled Veteran Owned, ... | ||
Seventh Annual East Tennessee CyberSecurity Summit Coming to ... By Rebekah Winkler The East Tennessee CyberSecurity Summit Committee will host the Seventh Annual East Tennessee CyberSecurity Summit on October 12 and 13 at the Hilton Hotel in downtown Knoxville. The conference is co-hosted by the University of ... Tennessee Today | ||
viaForensics on CompTIA cybersecurity panel – viaForensics ... By lhaas viaForensics' Andrew Hoog participated in a panel discussion: Cybersecurity in the Age of Mobility. Listen to the experts discuss new threats and vulnerabilities for cybersecurity created by mobility and how to promote technological innovation ... viaForensics | ||
Sotera Wins 5 SPAWAR Cybersecurity, C4ISR Awards; John Hillen ... John Hillen, Sotera Defense Solutions. Sotera Defense Solutions has won more than $15 million in cybersecurity and C4ISR program contracts and award modifications with the Space and Naval Warfare Systems Command. “The breadth of ... GovCon Wire | ||
World Experts and Scholars Combat Cyber Security Attacks at NYIT ... By New Jersey Technology Council 19, 2011) – Days after the country marks the tenth anniversary of the 9/11 attacks, NYIT will host its Cyber Security Conference to discuss cyber vulnerabilities and the latest measures to protect individuals and organizations against attacks. ... New Jersey Technology Council News Wire | ||
Windows XP on TSA laptops? TSA Dinged in Wireless ... By admin TSA Dinged in Wireless Cybersecurity Audit. August 31, 2011 By admin. via NetworkWorld. We've questioned whether or not IT departments are too slow to patch Windows, and then took a survey that basically told us what we know, that ... CrucialPointLLC | ||
One Minute Wonders: The impact of new technologies on ... By bcattolica Karl Smith, Head of Cyber Security Assurance Services, BT Global Services. Jim Tiller, Global Security Practice Head, ... One Minute Wonders: The impact of new technologies on cybersecurity. By Tara Savage, Senior Marketing Manager, ... SecureThinking | ||
MAKING THE SECURITY DATA HAYSTACK DISAPPEAR ... By ICCSRam ... indications of future security issues to come. Join us at the International Conference on Cyber Security (ICCS 2012) to meet and learn more from David McQueeney, IBM's Vice President for Software as he discusses security analytics. ... International Conference on Cyber... | ||
GCSA boon for IT security sector | Malaysia By lian.huang PETALING JAYA: The proposed Global Cybersecurity Alliance (GCSA) is set to be a platform for Malaysia and other countries to exchange ideas and expertise that will lead to a better, more secure cyberspace. Cybersecurity Malaysia chief ... Malaysia | ||
Infosecurity (USA) - IT professionals fret about smart grid cybersecurity A full 77% of IT professionals said that they are concerned about smart grid cybersecurity, according to a survey by nCircle. www.infosecurity-us.com/.../it-professionals-fret-about-smart-... | ||
National Cyber Security Alliance to Coordinate Data Privacy Day ... The National Cyber Security Alliance (NCSA), a non-profit public-private partnership focused oncybersecurity awareness and education for all digital citizens, ... www.educause.edu/blog/vvogel/.../234758 | ||
Collaborative Cybersecurity Booz Allen's RightIT approach helps federal agencies reduce IT costs up to 40 percent and improve IT operations and services. www.boozallen.com/.../Collaborative-Cybersecurity-in-a-Conn... | ||
Northrop brings cyber security expertise to UAE Leading global security company Northrop Grumman will showcase its cyber security expertise at a major summit to be held next month in Abu Dhabi. www.tradearabia.com/news/DEF_204009.html | ||
NIST: Simplicity can be great cybersecurity ... - Federal News Radio Federal News Radio - Your source for federal news, now. www.federalnewsradio.com/?sid=2515177&nid=35 | ||
SecureInfo Awarded Blanket Purchase Agreement for Cybersecurity ... GSA and DHS' Federal Network Security (FNS), an organization within the National Cyber SecurityDivision will directly oversee work performed under this BPA. ... www.istockanalyst.com/.../secureinfo-awarded-blanket-purcha... |