Republicans back cybersecurity law push Financial Times By Joseph Menn in San Francisco Republicans signalled support for major legislation aimed at bolstering US cybersecurity – giving such a law an improved chance of passage – with their first policy recommendations on the issue. A task force appointed by ... | ||
BRT: Business Cares About Cybersecurity Nextgov By Jessica Herrera-Flanigan 10/11/11 11:15 am ET The Business Roundtable on Monday Tuesday unveiled a cybersecurity strategy to "to protect US economic and national security from growing global cybersecurity threats." Drawing from dozens of existing ... | ||
October Is National Cyber Security Month North Country Gazette TALLAHASSEE, FLA000The Florida Department of Law Enforcement (FDLE) is recognizing October as National Cyber Security Month. Floridians are encouraged to educate themselves about Internet safety and review tips for keeping children safe online. ... | ||
Netronome to Showcase Innovative Flow Processing Building Blocks at ISS Word ... MarketWatch (press release) WASHINGTON, Oct 12, 2011 (BUSINESS WIRE) -- ISS World Americas #108 -- Netronome, the leading developer of network flow processors, today announced that they will be showcasing a comprehensive suite of building blocks for designers of cyber security ... | ||
| ||
SAIC outfits Navy with new IA, cybersecurity support Washington Technology The contract calls for SAIC to provide the Space and Naval Warfare Systems Center (SSC) Atlantic with information assurance and cybersecurity services for its mission of providing tactical, strategic and operations support, according to an Oct. 12 SAIC ... | ||
IT Olympics: Cyberattacks to test cybersecurity of London Olympic Games Computerworld (blog) Pennell talks more about the tech and the cyber security behind the TOC and London Olympics in the video below. Meanwhile the Olympic Committee said it was "unaware of any specific attack," but TechWatch reported committee concerns "that the rise in ... | ||
| ||
| ||
Businesses, Republicans Aim For Cybersecurity Assistance, Not Regulation National Journal No fully integrated effort exists to coordinate the government's economic, homeland-security, and defense cybersecurity programs, for example. There is no clear system for sharing-information between government and businesses; businesses don't have ... | ||
Cyber threats to increase in 2012: Report Times of India The report was released at the annual Georgia Tech Cyber Security Summit. Georgia Tech Cyber Security Summit is one forum where the IT security ecosystem can gather together to discuss and debate the evolving nature of cyber threats, and to chart the ... | ||
Sensus Joins EnerNex, ORNL To Increase Cybersecurity In Smart Meters Renew Grid The AVUD project, funded by the US Department of Energy's Office of Electricity Delivery and Energy Reliability, is developing a system for cybersecurity vulnerability detection in smart grid components. The system, known as the Function Extraction ... | ||
Cyber security: public problem, private answers EUobserver.com This comes hot on the heels of Obama's national cyber security strategy. Both sides of the pond are engaged in a dialogue politically - via the EU-US working group on cyber security and cyber crime (May 2011) and militarily, with Nato putting in place ... | ||
Will congressional infighting stall cybersecurity laws? FCW.com That's going to require real money and addressing the laws and impediments,” said Melissa Hathaway, president of Hathaway Global Strategies and a former top cybersecurity official under Presidents George Bush and Barack Obama. Hathaway spoke as part of ... | ||
Cyber Threats Top Concern for Fed IT Staff But Uncertainty Surrounds ... ExecutiveGov Cybersecurity is still a major worry of government IT personnel, presenting an opportunity for data protection vendors, according to two recent surveys by Cisco and MeriTalk. In the Cisco-sponsored study, 71 percent of the federal IT managers surveyed ... | ||
Michigan to build its own cyber command center GCN.com By GCN Staff The economically hard-hit state of Michigan is hoping to become a national leader incybersecurity with the development of a new cyber command center, Government Technology reports. Gov. Rick Snyder announced plans for the new Michigan ... | ||
Terrorists yet to turn to cyberattacks UPI.com Cybersecurity expert James Lewis, of the Center for Strategic and International Studies, said in a telephone interview that causing physical damage and devastation using the Web is far more complicated than the minor attacks terrorist groups may be ... | ||
DHS Explains 12 Planned Cloud Services to House Cybercommittee ExecutiveGov The DHS will offer nine private clouds and three public versions, Chief Information Officer Richard Spires told the House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologiesa House cybersecurity subcommittee. ... | ||
Raytheon's cyberchief describes 'Come to Jesus' moment Computerworld "We truly had the 'come to Jesus moment' five years ago because we decided ... to sell missiles to Taiwan," said Vincent Blake, head of cyber security at Raytheon UK, during a panel session at the RSA security conference in London on Wednesday. ... | ||
ictQATAR's Q-CERT enhances cyber preparedness in critical sectors through ... AME Info Q-CERT, the Cyber Security arm of the Supreme Council of Information and Communications Technology (ictQATAR) has partnered with the SANS Institute, world-renowned source of information security training and security certification, ... | ||
AVG's Q3 Threat Report – Cyber criminals are a moving target iTWire By David Heath Based on automated feedback from the vast majority of AVG's customers, the latest Threat Report paints a pretty dismal view of the current state of cyber security. AVG's latest Threat Report (33 page PDF) was released today and with it's ... | ||
| ||
| ||
Who's listening to your conference calls? CRN Australia As a cybersecurity investigator, it's tempting to focus on the latest and greatest from the world of hacking. Some attacks being successfully carried out are mind boggling in their technical sophistication. But we try to approach incidents with an open ... | ||
Why still so many cyber weaknesses at agencies? FederalNewsRadio.com Senators have also introduced the Cybersecurity and Internet Freedom Act of 2011 to modernize FISMA. And just last week, the White House set new cybersecurity safeguards, such as creating an information-sharing committee and appointing a senior ... | ||
| ||
GovWin Recon: Oct. 12: Panetta Policy Speech; HBGary CEO States China is Top ... govWin (blog) He also said that cybersecurity would buck the cost-cutting trend by seeing more spending and urged Congress not to cut defense spending beyond the already planned $450 billion. HBGary CEO: China is the number one cyber-threat [Thinq_] – In this ... | ||
Raytheon's Cyber Operations Training Added to GSA Schedule PR Newswire (press release) "As an approved GSA Schedule vendor for cyber security training, we're now able to serve our government customers with a streamlined way to purchase our capabilities-based training," said Steve Teel, vice president for Global Training Solutions at ... | ||
EU Cybersecurity Agency ENISA Launches Guide On Building Effective IT Security ... Dark Reading The Executive Director of ENISA, Professor Udo Helmbrecht, comments: "There is a need for a truly international, global approach to cyber security and Critical Information Infrastructure Protection. No country can create a CIIP strategy in isolation, ... | ||
Sensus, EnerNex test new technology for smart grid vulnerability Fierce Smart Grid ... the Automated Vulnerability Detection (AVUD) system, known as the Function Extraction (FX) system, which will apply the newly developed technology of software behavior computation for cyber security vulnerability detection in smart grid components. ... | ||
A Breakdown of Where the Spam in Your Inbox Comes From The Atlantic Wire The company today released a cyber-security report (PDF) that took a look at, among other things, the types of spam intercepted by its email application, Microsoft Exchange, and conveniently summarized the findings in the pie chart above, as blogged by ... | ||
Raytheon Gets Army Contract Daily Markets The company was acquired by Raytheon in 2009 to augment its Intelligence and Information Systems segment, whose importance rose in recent times with Pentagon's emphasis on cyber security and mission-critical intelligence products. ... | ||
October is Cyber Security Month-Protect and Educate Children with ... By Blackmere Protect and Educate your Children with the Online Premier Community for Kids, The Ultimate Kids' Internet, during Cyber Security Month Online PR News – 11-October-2011 –(San Diego, CA. October 11, 2011) – According to the Federal ... Blackmere Consulting | ||
Government Information » Cyber Security in the UK By alan zoellner Links and annotations for national, state, and local government publications. Government Information | ||
Cyber security | London 2012 | Olympics | The Daily Caller By Joshua Peterson The London Olympics had learned lessons from Beijing in how to handle cyber security, the games' CIO said Monday at the unveiling of the games' technology center. ... Republicans focus on incentives with cybersecurity recommendations ... The Daily Caller | ||
National Cyber Security Awareness Month - Educate Your Staff In ... By kwright National Cyber Security Awareness Month – Educate Your Staff In Cyber Security. October 12th, 2011 by kwright. We are continually reminded about the importance of robust and resilient cyber defences when protecting our businesses' ... IT Governance Blog on IT governance,... | ||
Have you been hacked? | International Conference on Cyber Security By ICCSRam Floating in the clouds, how vulnerable are we (and our gadgets)? Matt Johansen of White Hat Security's Threat Research Center spent months hacking Google's Cr-48 prototype laptops. His findings are revealing. Johansen discovered ... International Conference on Cyber... | ||
SJSU students become cyber security experts by being the enemy ... By Peter Fournier Though the Department of Homeland Security recognizes just the month of October as National Cybersecurity Awareness Month, students spend a much longer time trying to learn to be the very enemy they will try to stop in a real-life job. ... Spartan Daily | ||
Cyber Threats Forecast for 2012 | ScienceBlog.com By admin The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security. According to GTISC, GTRI and the experts cited in the ... Science Blog | ||
Get Cyber Safe - Local Blogs By Vic Toews October is National Cyber Security Awareness Month and I was pleased to launch the Government of Canada's initiative to promote Cyber Security at an event at the University of Ottawa. Canada's competitive position in the global economy ... Local Blogs | ||
DOC/DHS Push for Notice on Botnets and Malware, Supreme Court ... By David LeDuc At an event hosted by CSIS last week, Cam Kerry, General Counsel of the Commerce Department and Howard Schmidt, Cybersecurity Coordinator for the Obama Administration, emphasized the importance of their recently launched initiative to develop models to advance voluntary corporate notification to consumers regarding the illicit use of computer ... He focuses on e-commerce, privacy,cyber security, cloud computing, open standards, e-government and information policy. ... SIIA Digital Discourse | ||
Security is Complex – Keep it Simple « SecureThinking By bcattolica Cyber Security is a funny thing. There are a vast array of technical solutions and security products on the market, yet we still struggle to contain a tsunami of malware and advanced threats. Why? The answer may lie in a deeper understanding ... SecureThinking | ||
Republicans urge incentives for cybersecurity | Business Insurance WASHINGTON (Reuters)—A Republican task force in the House said Congress should give companies incentives to boost their cyberdefenses, but tougher ... www.businessinsurance.com/article/20111006/.../111009945 |