SEC Urges Disclosure of Hacker Threats in Public Company Filings Bloomberg “This guidance fundamentally changes the way companies will address cybersecurity in the 21st century,” Senator Jay Rockefeller, a West Virginia Democrat, said in a news release. Rockefeller and four other senators wrote to SEC Chairman Mary Schapiro ... | ||
Cyber security: Education is the key MIT News Each October, in an effort to increase awareness and prevention of online security problems, the US Department of Homeland Security and the National Cyber Security Alliance spearhead NationalCyber Security Awareness Month (NCSAM). ... | ||
General Dynamics Awarded Information Assurance and Cyber Security Contract by ... MarketWatch (press release) "General Dynamics will provide the highest level of information assurance and cyber security support to DIA's enterprise, networks and security domains," said Thomas Kirchmaier, senior vice president and general manager of General Dynamics Information ... | ||
| ||
Dronegate: The First Casualty is our Cybersecurity Paradigm SYS-CON Media (press release) (blog) If initial reports were true, then our military cybersecurity is in a lamentable state. The most critical element of perhaps our most vital weapons and intelligence systems would have been breached, and the primary defenders were kept in the dark ... | ||
Public sector must lead by example on cybersecurity, says minister UKauthorITy.com Cybercrime in all its forms was now perceived as one of the main national security threats to UK, Brokenshire said, a fact which had led the government to set up the National Cyber SecurityProgramme last year including £63m to tackle cybercrime. ... | ||
Cyber Security WSIL TV By Matt Rudkin WSIL - You can do just about anything on the internet today -- balance a checkbook, apply for a loan, or even fill a prescription. But the federal trade commission says more than 70% of us have passwords that do not meet security ... | ||
UTSA hosts Panoply cyber security competition Saturday, Oct. 15 UTSA Today Hosted by the UTSA Center for Infrastructure Assurance and Security (CIAS), the cyber challenge simulates an average workday for a cyber-security professional. The 2011 competition is 10 am-4 pm, Saturday, Oct. 15 at the Hilton San Antonio Airport ... | ||
Brit cyberwarriors, your country needs you Register By Guardian Government Computing • Get more from this author The government is proactively addressing its failure to retain internet specialists to deal with cyber security threats, according to a document (PDF) presented to Parliament by Prime ... | ||
| ||
Alamo Chapter of the Armed Forces Communications and Electronics Association ... PR Newswire (press release) SAN ANTONIO, Oct. 13, 2011 /PRNewswire-USNewswire/ -- The Alamo Chapter of AFCEA is pleased to host the 2nd Annual Alamo ACE on December 13-16, the premier symposium event for IT/Cybersecurity professionals. This year's conference theme is 'Mission ... | ||
| ||
| ||
Enterprises need to focus on data, enterprise culture CSO Georgia Tech's annual Cyber Security Summit, held Oct. 11, 2011, where security experts from industry, academia, and government discussed some of the more pressing IT security challenges, found the mobile threats and the ability to control data shared ... | ||
| ||
Cyber-Terror Vulnerability Fox News During a recent cyber-security summit in New York, numerous experts warned that cyber-attacks could not only cause billions of dollars in damage to such vital systems, but endanger national security. The Stuxnet virus, which hit Iran's nuclear ... | ||
BlackBerry: Still No. 1 National Journal But because of cybersecurity concerns, that may not be so smart. Already, BlackBerrys no longer dominate on Capitol Hill. In the past year, lawmakers have allowed more smartphone options, letting staffers do their work with iPhones and Android phones. ... | ||
Occupy Wall Street protest gets a visit from Anonymous target Aaron Barr Techworld.com Barr, who is now director of cybersecurity for a company called Sayres and Associates, dyed his hair blue and mingled with protestors on Wall Street on September 17, an action supported by Anonymous, the loose collective known for its cyber protests. ... | ||
Joining up the fight against cybercrime: James Brokenshire's comments at the ... ComputerWeekly.com (blog) To set the context, last year we published the Strategic Defence and Security Review and the National Security Strategy, assessing cyber security to be one of the top four national security threats to the UK. We have set up a £650 million National ... | ||
| ||
Federal Cybersecurity Best Practices: FISMA Continuous Monitoring By Bruce Levinson Studies have found only limited, insufficient agency adherence with FISMA's (Federal Information Security Management Act) continuous monitoring mandates. One survey found almost half of federal IT professionals were unaware of ... CircleID: Featured Blogs | ||
Business Round Table on Cybersecurity - Microsoft Security Blog ... By Paul Nicholas - TwC Business Round Table on Cybersecurity. Paul Nicholas - TwC. 13 Oct 2011 11:10 AM. Comments 0. This week Business Roundtable (BRT) released its report Mission Critical: A Public-Private Strategy for Effective Cyber Security. Microsoft is ... TechNet Blogs | ||
The SEC Issues Disclosure Guidance on Cybersecurity By Vanessa Schoenthaler The Securities and Exchange Commission's Division of Corporation Finance issued disclosure guidance on cybersecurity risks and cyber attacks. 100 F Street | ||
CRE Announces Federal Cybersecurity Best Practices: FISMA ... By jim Study Fills Needs for Applied Best Practices Guidance. The Center for Regulatory Effectiveness (CRE), a regulatory watchdog, is releasing a best practices assessment of agency compliance with FISMA's continuous monitoring requirements. ... FISMA Focus | ||
SEC to public companies: disclose major cyber attacks ... By admin Discussion of aspects of the registrant's business or operations that give rise to materialcybersecurity risks and the potential costs and consequences;; To the extent the registrant outsources functions that have material cybersecurity risks, description of those functions and how the registrant addresses those risks;; Description of ... Companies may also need to disclose “known or threatened cyber incidents” to place any discussion of cyber security risks in context, the guidelines add. ... TechJournal South | ||
National Cyber Security Alliance, McAfee and CyberSmart ... WASHINGTON, Oct. 13, 2011 /PRNewswire-USNewswire/ — The National Cyber Security Alliance (NCSA) – a non-profit public-private partnership focused on cybersecurity awareness and education for all digital citizens – in partnership with ... Web Buyers Guide | ||
CyberSecurity Unisys' comprehensive CyberSecurity and compliance offering enables organizations counter the rising threat of cyber-crime. www.unisys.com/unisys/theme/index.jsp?id... | ||
The Future of Cybersecurity: Understanding How the Next Billion ... The Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security ... blogs.technet.com/.../the-future-of-cybersecurity-understandin... | ||
National Cyber Security Awareness Month Kick-Off Event Blog | Stay ... Second Nature - The Cybersecurity Blog. Home | Blogs | emilyeckland's blog | National Cyber Security Awareness Month Kick-Off Event Blog ... www.staysafeonline.org/.../national-cyber-security-awareness-... | ||
Cyber Security Infographic | ProtectMyID ProtectMyID.com blog is dedicated to educating consumers about the crime of identity theft and the stories shared here are based on the lessons learned over ... blog.protectmyid.com/2011/10/06/cyber-security-infographic/ |