|
Viscount to Present at Cyber Security Finance Forum
MarketWatch (press release)
BURNABY, British Columbia, Oct 17, 2011 (BUSINESS WIRE) -- Viscount Systems (otc markets:VSYS), the industry leader in IP-based access control systems, is pleased to announce that The Company has been invited to present at the Cyber Security Finance ...
|
National Youth Cyber Security Challenge Draws in More Than 1000 Teams
MarketWatch (press release)
Established by the Air Force Association (AFA), CyberPatriot is the nation's largest and fastest growing high school cyber security challenge. Last year's competition had more than 660 teams vying for a chance to compete among the top qualifying teams. ...
|
|
* Cyber Security Week 2011 in Sri Lanka begins today
Colombo Page
Oct 17, Colombo: Sri Lanka will hold its annual Cyber Security Week (CSW) beginning today, the Sri Lanka Computer Emergency Readiness Team (SLCERT) announced. Cyber Security Week 2011 program features, a one-day conference on October 19 and two ...
| |
|
IT Governance supports the National Cyber Security Awareness Month
EIN News (press release)
/EINPresswire.com/ October see's the start of National Cyber Security Awareness Month, an initiative by the Department of Homeland Security. Its aim is to raise awareness amongst individuals and organizations about cyber security and increase the ...
|
GD Wins $86M Contract for Cyber Security from US DoD
Defenseworld.net
General Dynamics Information Technology, a business unit of General Dynamics, has been awarded an $86 million task order to provide information assurance and cyber security services to the Defense Intelligence Agency (DIA) in the US and worldwide. ...
|
Smartphones increasing global cyber crime
TruthDive
London, Oct 17 (ANI): Cyber security experts have warned that the world is facing a wave of cyber crime, and blame it on our newly found addiction to the smartphone for the cause. “This is a fully fledged computer that's sitting in your pocket,” Sky ...
|
DHS assessed Anonymous threat to industrial control systems
Inquirer
Earlier today, the Public Intelligence project published a bulletin entitled "Assessment of Anonymous Threat to Control Systems" that was drafted by the National Cybersecurity and Communications Integration Center (NCCIC) back in September. ...
|
Hackers spent a lot of their time educating other hackers
VentureBeat
Hackers spent about 25 percent of their time in forums educating other hackers about beginner tips, according to a survey by cyber security firm Imperva. Hackers devote a lot of time to hacking tutorials, which means there is a strong and steady ...
|
Cyberspace and US Competitiveness
Council on Foreign Relations
Additionally, privacy and cybersecurity issues are significant problems for both US businesses and consumers that government has not sufficiently addressed. In this roundup, four experts suggest ways for the United States to improve its cyber ...
| |
|
|
Digital deterrents: Preventing a Pearl Harbor of cyberspace
Washington Post (blog)
Given the extent of this risk, it's perhaps not surprising that 90% of our nation's cybersecurity dollars are spent on defense. However, in order to prevent the first Pearl Harbor of cyberspace, is it time to start shifting more of those dollars to ...
|
Gimme Mundie
Varsity
BIANCA LEMUS LAVARREDA sits down with Microsoft top dog Craig Mundie to talk cyber security, patent wars, and post-secondary education. On October 6, U of T's Department of Computer Science hosted a special lecture by Craig Mundie, the Chief Research ...
|
Computer Expert Leaks Thousands of Protester Emails
Newser
By Matt Cantor, Newser Staff (Newser) – A cyber-security expert has released thousands of Occupy Wall Street protesters' emails—and says he has learned which of the protesters are affiliated with Anonymous. Group members are participating in the ...
|
Labour unveils ICT policy
Computerworld New Zealand
Labour says it supports the government's Cyber Security Strategy and would establish a Computer Emergency Response Team for New Zealand as well as encouraging the development of cyber security expertise at the tertiary education level and via ...
|
World Is Facing A Wave Of Cyber Crime
Sky News
Henry Harrison, from UK cyber security experts Detica, said: "This is a fully fledged computer that's sitting in your pocket." It can, and probably will, betray you as a result. The flaw in the smartphone is that it is too useful and too user friendly ...
| |
|
Romney's wrong on defense spending
Concord Monitor
If elected, Romney said, he would expand the Navy, deploy carriers off Iran's coast, beef up missile defenses and increase spending on cyber-security. The latter is a necessity. Critical systems are far too vulnerable to internet attacks and ...
|
|
Tackling the cyber enemy
CIOL
Therefore, it is not surprising that cyber security has become such an important economic and national security issue. From our vantage point as a provider of security solutions, we are seeing the rapid evolution of the threat landscape, ...
|
Rapid Fire 2011-10-17: New MoD Secretary | Korea's Exports
Defense Industry Daily
91% of the ~$235M goods and services exported to the US were for cyber security. Boeing consolidates its DRT, Argon, and ISR assets into an Electronic & Mission Systems (E&MS) division to go after the C4ISR market. DRT and Argon ST were acquired in ...
|
Hacker Threats, Solvency II, Philippine Bonds: Compliance
BusinessWeek
Senate Majority Leader Harry Reid, a Nevada Democrat, is compiling comprehensive cybersecuritylegislation. In its guidance, the SEC recognized concerns about giving hackers too much public information through “detailed disclosures,” and said such ...
|
Interview with Aaron Friedberg: Is China going to displace the US?
Washington Post (blog)
The US government has been investing considerable resources in defensive measures, but a complete cybersecurity strategy is going to have to include an offensive component. How would the sorts of defense cuts contemplated by the “trigger” in the ...
|
Protecting The Extended Enterprise
Forbes
To deliver on our core mission as Security & Risk professionals — safeguarding intellectual property, managing third-party risk, complying with regulations, and anticipating the next cybersecurity threat, etc — we need to seek out these efforts to ...
|
Fit-for-purpose resources from IT Governance make DPA compliance easy
EIN News (press release)
A comprehensive risk assessment will expose the vulnerabilities and identify the need for cyber security measures. Organisations can spare themselves a great deal of time and money by implementing simple and cost-effective solutions to protect their ...
|
|
RSA, Sony Breach News, Wireless Outages Lead Week's Security News
eWeek
As Congress continues to debate and negotiate the details for what needs to go in the cyber-security bill, the Securities and Exchange Commission took action, issuing a guidance recommending that public companies disclose all cyber-risks and incidents ...
|
|
Securing the Smart Grid
CSO Magazine
The Smart Grid's primary cyber security objectives must include protecting all services from malicious attack; preventing security incidents from compromising safety and protection; and delivering confidence in the confidentiality, integrity and ...
|
|
|
|
|
|
|
|