Cybersecurity Requires
Patches, Not a Vast Bill: Susan Crawford
BusinessWeek 29 (Bloomberg) -- When cybersecurity problems arise, the best response is to adopt a patch as soon as it's available. You don't want to wait for an entirely new operating system to be created, and you really don't want to use such a system until it has ... |
||
Booz Allen Reports Top Ten Cyber Security Trends for Financial Services in 2012
MarketWatch (press release) "These trends highlight the fact that cyber security today is about living with and managing the risk in your network. It's more than just preventing security violations," said Bill Wansley, senior vice president at Booz Allen Hamilton. ... |
||
UK Cyber-Security Strategy
Beefs Up Defenses, Information Sharing
eWeek The Cyber-Security Strategy will create a national digital crime investigative unit, a public-private hub to share cyber-threat intelligence and make it easier to report cyber-crimes. The United Kingdom outlined plans to secure critical infrastructure ... |
||
White House, Congress Renew Cybersecurity Push
TechNewsWorld "Some good news: just last week, we had a very encouraging meeting with a bipartisan group of Senators that ended with agreement to work together to enact cyber security legislation as soon as possible," said Howard Schmidt, cybersecurity coordinator ... |
||
Kratos Partners With AlienVault to Enhance Cyber Security and
Situational ...
MarketWatch (press release) AlienVault is the developer of advanced cyber security products including the AlienVault Unified SIEM Solution, a complete Security Integration and Event Management (SIEM) platform that unifies management of critical security systems and processes ... |
||
|
||
|
||
FCC Cyber Security Tips
for Small Businesses
IT Business Edge (blog) The FCC published a list of "Ten Cybersecurity Tips for Small Businesses" earlier this year, which you can access here (pdf). In case you haven't seen it, however, I've highlight the 10 pointers below with my take on the various tips and links for ... |
||
Students win cyber-security challenge
UConn Daily Campus With banking and business, as well as personal and national security information, being conducted online cyber-security and privacy is increasingly important. As the world's digital world continues to expand, cyber-security has become a career ... |
||
Trend Micro and the International Cybersecurity Protection
Alliance to ...
MarketWatch (press release) Trend Micro is one of the principal sponsors and founding members of the ICSPA (InternationalCyber Security Protection Alliance), which is leading the event. ICSPA is chaired by the Rt Hon David Blunkett, MP and was established with the support of the ... |
||
Charlie Miller, former hacker now working on cybersecurity
NATO Community Charlie Miller is a former hacker who has become an information security consultant. He was invited to the conference on cyber conflict held by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn in June, where he talked about the ... |
||
Cyber Security
WGBA-TV By NBC26 News Team A new survey shows more people plan to shop using their tablet or smartphones. Experts warn that security software for mobile devices is far behind normal desktop computers. They say the best way to protect yourself is a password ... |
||
|
||
|
||
U.S. Military Chief: "We're under constant attack every
day"
Examiner.com Nov 28, 2011 On Monday, the new Chairman of the Joint Chiefs of Staff, General Martin Dempsey warned about the constant breaches to the nation's cyber-security and continued vulnerability to cyber-terrorism. US military officials have frequently warned ... |
||
Ethical hacking contest at Amrita University
The Hindu Amrita Centre for Cyber Security of Amrita Vishwa Vidyapeetham is conducting 'India Capture the Flag (InCTF)', an ethical hacking contest. It is to promote awareness about cyber security among students and hive them hands on experience in secure coding ... |
||
Invincea Finishing 2011 With New Funding and Strong Momentum
MarketWatch (press release) ... the Fortune 100 -- Recognized Leadership: -- Invincea CEO Anup Ghosh was recently appointed as a member of the National Academy of Engineering's Naval Studies Board to contribute to the development of the US Navy's future cyber security strategies. ... |
||
Twitter buys mobile security firm Whisper Systems
Digitaltrends.com Twitter is likely about to get more secure with its newly announced acquisition of cybersecurity firm Whisper Systems. Twitter has purchased cybersecurity firm Whisper Systems, which is best known for its antivirus software for Google's Android mobile ... |
||
Oculis Labs Joins Northrop Grumman Cync Program
MarketWatch (press release) "Oculis Labs develops unique cyber-security products to protect personal, commercial and government computer systems from visual eavesdropping," said Bill Anderson, CEO, Oculis Labs. "Joining the Cync Program gives us a considerable business advantage ... |
||
IEEE Experts Predict Smartphone Hacking Will Soar in 2012
PR Newswire (press release) Dr. Madjid Merabti, an IEEE Senior Member and Professor of Networked Systems at Liverpool John Moores University, UK, says while the public has been trained to recognize cyber-security threats associated with their PCs and laptops, they do not see ... |
||
MasterCard spent $580000 lobbying in 3rd quarter
CBS News The payments processor also lobbied the federal government on legislation involving the fees charged to merchants for processing debit card purchases, issues related to financial privacy, data security and cybersecurity, and market access issues in ... |
||
|
||
No evidence of hacking at Illinois water plant, says DHS
Fierce Homeland Security In a bulletin (.pdf), DHS says US-CERT and FBI cybersecurity teams sent to the water plant near Springfield, Ill. found no evidence of cyber intrusions, nor any evidence that plant credentials were stolen, or that the vendor was involved in malicious ... |
||
|
||
Fraud survey reveals extent of cyber crime
SC Magazine UK William Beer, director of cyber security services at PwC, said: “Organisations face serious threats from cyber criminals from within as well as outside. It is clear that senior executives need to take these risks more seriously. ... |
||
Control systems, incident reporting and online news
Intelligent Utility I discuss it here because the narrative arc maps directly to the power sector and its concerns aroundcyber security in the age of grid modernization. This narrative is likely to be repeated in the near future until it resembles the first half of the ... |
||
US vulnerable to cyber attacks: Military chief
Times of India The comments by General Martin Dempsey, chairman of the Joint Chiefs of Staff, were the latest by US military officials flagging cyber security as an area of growing focus and investment even as the Pentagon braces for declining budgets. ... |
||
|
||
North Korea trains sights on Blue House
Asia Times Online AP quoted November 8, 2011, Richard Clarke, a top adviser to three presidents for cybersecurity, as warning against going to war with North Korea: Clarke said if he was advising the president he would warn against attacking other countries because so ... |
||
Commentary: Private Sector Neglects Cyber Security | The
National ...
By Amitai Etzioni One major reason the United States is subject to damaging cyber raids is that significant segments of the business community refuse to erect much-needed cyber defenses. Such defenses cannot be limited to the public sector because much of ... The National Interest |
||
UK: Cyber-
Security Strategy: Government Lays Out Details Of Its ...
By Mikhail Doroshevich The government plans to use GCHQ resources and expertise to ensure the UK private sector has a robust cyber-security strategy in place and is protected from malicious attacks. This is one of the many pronged approaches the government ... Information Policy |
||
UK must get its cybersecurity act
together, says David Blunkett ...
By Blackmere The government is paying lip service to cybersecurity, yet cutting essential services at the same time, says David Blunkett, MP and chairman of the International Cyber Security Protection Alliance. With the publication of the new national ... Blackmere Consulting |
||
DHS wins national cybersecurity award for DNSSEC work ...
By Graveline The SANS Institute, which operates the Internet Storm Center, has awarded the 2011 U.S. NationalCybersecurity Innovation award to the U.S. Department of Homeland Security's Cyber SecurityResearch & Development Center. The center is ... DNSSEC Deployment Initiative |
||
White House, Congress Renew Cybersecurity Push | Knowledge ...
By John K. Higgins In a rare showing of bipartisanship, members of Congress and the White House are trying to breathe new life into the effort to enact national cybersecurity legislation. In a recent flurry of activity, mainly between the Obama administration and ... Knowledge Hub Networks |
||
UK Government's new Cyber Security Strategy - Electronic ...
By Panos Korkovelos The Uk Government has published its new Cyber Security Strategy, under which it "sets out how the UK will support economic prosperity, protect national security and safeguard the public's way of life by building a more trusted and resilient ... Electronic Communications Regulation... |
||
Intellect Blog » Blog Archive » UK Cyber Security Strategy 2.0
By Gordon Morrison The much anticipated new version of the Cyber Security Strategy is finally out. But is it any good? Well, generally its reception has been good and, from an Intellect point of view, we support it. In particular, Intellect was very pleased to see some ... Intellect Blog |
||
ED FSA Software Developer's Conference Focuses on Theme
of ...
By EDUCAUSE | Blogs The U.S. Department of Education (ED) Federal Student Aid (FSA) Software Developers Conference kicked off today with sessions on cybersecurity, identity management, and related topics of trust and identity in cyberspace. The event ... Janus University Blog |
||
No posting for a couple of weeks - Terry Zink's Cyber Security Blog ...
By tzink A blog about fighting spam and malware by a member of Microsoft Forefront Online Security anti-spam team. MSDN Blogs |
||
Private sector inherent to U.K. cybersecurity strategy - IT Compliance ...
By Ben Cole Federal governments all over the world have become increasingly hands-on with cybersecuritystrategy and online privacy, but businesses have sometimes been critical of new rules that they say will hurt their bottom line. Look at the ... IT Compliance Advisor |
||
MEF hosts Seminar on eCrime | Isle News : Isle of Man
By Jamesq The event was well attended by industry participants, David Butterworth of Skanco Business Systems Limited commented; “People with Cybersecurity skills are in short supply and the Isle of Man has the opportunity to address that gap, to the ... Isle News : Isle of Man |
||
Trend Micro and the International Cybersecurity Protection
Alliance ...
Trend Micro and the International Cybersecurity Protection Alliance to Establish ... (InternationalCyber Security Protection Alliance), which is leading the event. ... trendmicro.mediaroom.com/index.php?s=43&type... |
||
The Federal Energy Regulatory Commission's Unclassified Cyber ...
The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01. The Federal Information Security Management Act of ... energy.gov/.../federal-energy-regulatory-commissions-unclassi... |
Susan Crawford: Cybersecurity requires patches
UK gov's Cyber Security Strategy: friend or foe?
The UK government's Cyber Security Strategy: friend or foe? SC Magazine UK Friday saw the release of the government's Cyber Security Strategy that set out the UK's plans to build a more trusted and resilient digital environment. Work with ISPs to create a voluntary code of conduct to help people identify if their computers ... | ||
| ||
Cyber security threats: Will your enterprise be the next victim? SearchSecurity.in Cyber security threats are ubiquitous and devastating. In 2011 alone, companies such as Google and Sony have lost billions of dollars in market capitalization as an indirect outcome of cyber attacks perpetrated against them. ... | ||
Cyber security team honored Towerlight Towson University's cyber security defense team spent its summer differently than what some may consider an average college student's summer, according to cyber team coach and Director of the School of Emerging Technologies Michael O'Leary. ... | ||
Myricom Introduces Sub-$1K Timecode-based 10-Gigabit Ethernet Adapter for ... MarketWatch (press release) The 10G-PCIE2-8C2-2S-SYNC dual-SFP+-port adapter is specifically designed for applications such as cybersecurity and high frequency trading where accurate timestamping, lossless packet sniffing and injection at line rate, and cutting edge latencies are ... | ||
| ||
Weaknesses in US Cybersecurity Deterrence Strategy Lawfare (blog) by Jack Goldsmith I had an op-ed over the weekend arguing that last week's Defense Department report to Congress – which announced for the first time a policy of using offensive cyber weapons in response to threats or uses of significant cyber weapons ... | ||
Myricom Aims Product At Trading, Cybersecurity socalTech.com Arcadia-based Myricom, the provider of high speed clustering and networking adapters, announced this morning that it has shipped a new, 10-Gigabit Ethernet network adapter specifically aimed at thecybersecurity and high frequency trading market. ... | ||
Kratos Pays $17.5M for Cybersecurity Specialist San Diego Business Journal 15 that it acquired a company that specializes in cybersecurity for $17.5 million in cash. The acquired company, SecureInfo Corp., is located in the Washington, DC, suburb of Reston, Va. The sellers may receive an additional $2 million if the company ... | ||
| ||
Hackers Blow Up Illinois Water Utility…or Not TIME By Jerry Brito | @jerrybrito | November 28, 2011 | + A workstation is pictured at the US Department of Homeland Security's National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia. ... | ||
| ||
UK govt to ban criminals, cyber bullies from Net Times of India Criminals who commit offences online and cyber bullies will be banned from the internet as part of British government's new cyber security strategy. LONDON: Criminals who commit offences online and cyber bullies will be banned from the internet as part ... | ||
| ||
| ||
OAS Organizes Best Practices Workshop in Bogota on Cyber Security and Cyber ... ISRIA (registration) The Organization of American States (OAS), though the Secretariat of the Inter-American Committee against Terrorism (CICTE), will organize a workshop on best practices in cyber security and cyber crime this November 28-30 in Bogota for representatives ... | ||
| ||
National security database gets underway CIOL The project will bring together experts and professionals with in-depth knowledge and expertise in the area of information and cyber security. “We aim to have a strong database of over one lakh professionals by next year,” Setty added. ... | ||
Security measures 'must match up to data management needs' Ontrack Data Recovery Critical losses and breaches often occur through "staff choosing to manipulate the system", according to Centre for Cyber Security associate Mark Dempster. In order to reduce the risk of suffering lost data or recourse to complicated file recovery ... | ||
Government launches cyber security hub pilot CIO UK By Anh Nguyen | Published: 07:16 GMT, 28 November 11 | Computerworld UK The government has announced a pilot of a cyber security 'hub' that will enable the public and private sectors to exchange information on cyber threats. ... | ||
IL water system pump failure not cyber attack Government Security News The report backs earlier conclusions by DHS cyber security teams that the failure of the pump at Curran-Gardner Public Water District in Springfield, IL, wasn't the work of Russian cyber criminals or agents. The pump's failure in early November was ... | ||
NASSCOM-DSCI Annual Information Security Summit 2011 Siliconindia.com Supported by over 20 organizations, the Delhi Summit 2011 features leading authorities on Cyber Security & National Security, Mobility & Extended Organization, Data Centric Security, Cloud Computing, and Business Perspective of Security, as they engage ... | ||
SOPA Opponents' Bogus Net Neutrality Comparisons Forbes Assuming the House SOPA definitions are fine-tuned to better target only the worst rogue websites and not ensnare innocent players, and assuming the amended SOPA bill avoids unintended technical, cyber-security or privacy problems from actual ... | ||
Staying Safe on Cyber Monday WHSV That indicates that the website uses technology that encrypts your data. For more information on Cyber shopping safety tips, log onto www.dhs.gov and click on the Cyber security tab at the top of the page. | ||
VicSuper opts for earthwave's threat management services to protect its ... CSO Magazine ... a critical part of VicSuper's corporate governance framework and this agreement enables the not-for-profit company to augment its highly advanced security infrastructure by leveraging earthwave's expertise in threat management and cyber security. ... | ||
LAPD wins GSN's 2011 award for “Most Notable Law Enforcement Counter Terrorism ... Government Security News The Counter-Terrorism and Special Operations Bureau was also named a finalist in the GSN awards competition in the category of “Most Notable Cyber Security Program or Technology -- Government or Military.” | ||
UMBC CyberSecurity Group on LinkedIn · Community News ... You are welcome to post information or inquires regarding:- CyberSecurity jobs, internships, events, interview tips, research, tech gossips/discussions, new trends, hot topics, and other technical domains that overlap with cybersecurity. ... myUMBC News | ||
How Do We Encourage Companies to Embrace Cybersecurity ... By bcattolica At the end of last month I had the pleasure of traveling to Washington, D.C. to speak at Booz Allen Hamilton's conference on the significance of the cybersecurity dilemma. For over 90 minutes the panel delved into the question of why most ... SecureThinking | ||
Cyber-Security Threats Get More Sophisticated, Targets Individuals ... By Blackmere Cyber-security threats have evolved and businesses must learn from cyber-attacks used by Anonymous and LulzSec to create better security solutions, experts and speakers unanimously told attendees at a cyber-security panel discussion ... Blackmere Consulting | ||
Britain Publishes its New Cyber Security Strategy | LIVE HACKING By Ethical Hacker Com) - The United Kingdom has published its new Cyber Security Strategy subtitled “Protecting and promoting the UK in a digital world.” The strategy comes after the UK hosted an International Cyber Security conference in London last month. ... LIVE HACKING | ||
The UK Cyber Security Strategy - News - All the information you ... By PF The UK Cyber Security Strategy. Date Monday, November 28, 2011 at 12:46. | ||
Conference: 2nd Annual Cyber Security Summit, 11th – 12th April ... By Angelika Conference name: 2nd Annual Enterprise Cyber Security Summit From: 11.4.2012 To: 12.4.2012 Location: Prague, Czech Republic Venue: TBA Conference email: | Conference: 2nd Annual Cyber Security Summit, 11th – 12th April 2012, ... IT Security Magazine - Hakin9... | ||
UK Unveils New Cyber Security Strategy, Will Create New ... By Steve Ragan The Minister for the Cabinet Office and Paymaster General, Francis Maude, published a set of plans on Friday outlining the UK's goals over the next four years that will introduce sweeping changes to the nation's cyber security posture. SecurityWeek RSS Feed | ||
'Promising step' to cybersecurity | Zonkey Solutions By Zonkey International security programme, Chatham House. Hacking graphic The UK government plans “unprecedented co-operation” with businesses to improve cybersecurity. The UK government has today released its 2011 Cyber Security Strategy. ... Zonkey Solutions | ||
Deloitte: Comments On Strategy For UK Cyber Security | Big4.com By Rob Starr, Big4.com ... head of UK cybersecurity at Deloitte, commented recently on the UK's Cyber Security strategy saying that cybercrime has become a more sophisticated and challenging global issue for governments, businesses and individuals to conquer. Big4.com | ||
Cyber Monday - Cyber Security Toolkit Special Offer | IT Governance ... By kwright Today is Cyber Monday, the biggest online shopping day of the year. To celebrate we have a fantastic offer on our cyber security toolkit. With cyber crime a growing issue, the US government is trying to ensure that cyber security is at the top of ... IT Governance Blog on IT governance,... | ||
UK government lays out cyber security plans - IT Secure Site By admin IT Secure Site - UK supervision lays out cyber confidence plans. IT Secure Site | ||
Myricom Introduces Sub-$1K Timecode-based 10-Gigabit Ethernet ... Myricom SYNC dual-port 10GbE SFP+ adapter enables Lynx Capital Partners to more accurately measure and monitor the performance of its high frequency trading platform | Virtual Strategy Magazine is an online publication devoted entirely ... Virtual-Strategy Magazine - Your... | ||
Ping! Zine » Money and Glory – The Motives for Business Owners ... By Ping! Zine Editor Redi, whose website Zone-H archives hacking incidents, has worked in cyber security for more than eight years, observing the evolution of hackers and their motives. “In recent years I have seen the complete process of 'hacking-for-fun' evolve ... Ping! Zine | ||
Update: Industry welcomes government cyber security plan but ... As the government unveiled its cyber security strategy, industry experts welcomed the strategy but questioned some of the specifics. www.computerweekly.com/.../Industry-reaction-to-governme... | ||
Are cybersecurity bachelor's degrees worth the time? | TechRepublic Some are pushing the need for cybersecurity degree programs. But would those graduates lack the general IT skills necessary? www.techrepublic.com/blog/career/are...bachelors.../3662 | ||
BBC News - UK cybersecurity plan a 'promising step' but with risks UK cybersecurity plan a 'promising step' but with risks. David Clemente ... The UK government has today released its 2011 Cyber Security Strategy. With an ... www.bbc.co.uk/news/technology-15893773 | ||
Accounting for Cybersecurity - (Part 2 of 4) - SourcingSpeak Blog In Part One of this article, we looked at the Securities and Exchange Commission (SEC) Division of Corporation Finance's recent release - CF Disclosure ... www.sourcingspeak.com/.../accounting-for-cybersecurity---pa... |
Subscribe to:
Posts
(
Atom
)