http://judiciary.house.gov/hearings/pdf/Oyama%2011162011.pdf
Reid to Move on Senate Cybersecurity Legislation in Early 2012 Bloomberg By Eric Engleman - Thu Nov 17 15:15:18 GMT 2011 Senate Majority Leader Harry Reid intends to bring comprehensive cybersecurity legislation to the Senate floor for debate early next year. Cyber attacks and espionage are “causing billions of dollars of ... | ||
2012 Cyber Security Predictions from the Websense Security Labs PR Newswire (press release) SAN DIEGO, Nov. 17, 2011 /PRNewswire/ -- With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? We asked the top researchers of the Websense Security Labs™ to take a few minutes and provide their top ... | ||
Senate Punts Cybersecurity to 2012 Nextgov By Aliya Sternstein 11/17/11 07:02 am ET The Senate plans to hold a vote on comprehensive cybersecurity reforms during the first work period of 2012, according to senators on the committee with jurisdiction over federal computer protections. ... | ||
CounterTack Collects $9.5M for Cyber Security, Opens Boston-Area Headquarters Xconomy For every tech company that leaves Boston, it seems, another one moves in. In this case, the local security software cluster just got stronger—and a new approach to combating cyber attacks has arrived. CounterTack, a security company formerly known as ... | ||
Cybersecurity Malaysia Wins Ethical Hacking Contest Bernama KUALA LUMPUR, Nov 17 (Bernama) -- CyberSecurity Malaysia, the national specialist centre forcyber security, has won the Global CyberLympics Asia Pacific Championship, the first international team ethical hacking competition ever organised in Malaysia. ... | ||
DOT continues to lag on resolving cybersecurity problems FierceGovernmentIT DOT centrally tracks POA&Ms in a central system called Cyber Security Assessment and Management, but DOT component agencies don't always enter all known weaknesses into CSAM, the report says. The report also says office of the secretary of ... | ||
| ||
| ||
Strategy: Cybersecurity: Continuous Monitoring Action Plan InformationWeek Government Federal agencies must transition from static cybersecurity defenses to automated, real-time monitoring and response. Here's how IT security teams can get started. (S2470211) John Sankovich is a vice president with Inforeliance Corp., which designs, ... | ||
The Business Cyber Security Summit 2011 IT-Director.com from Kids Say the Darndest Things Cyber security is fast becoming a business critical issue for many organisations around the globe. Recent high profile cases including the IMF, Citigroup, Sony, Apple, and the UK Office of National Statistics highlight ... | ||
New cyber-security rules for defense contractors The Daily Yomiuri Defense contractors will be obliged to immediately report instances of servers or computers containing confidential information being infected by a virus, under changes planned by the Defense Ministry, it has been learned. The requirement is part of ... | ||
| ||
| ||
OVERNIGHT TECH: SOPA debate far from over The Hill (blog) One of the key voices still on the fence is House Cybersecurity subpanel Chairman Dan Lungren (R-Calif.), who said he thinks the issue requires more serious consideration. Lungren would like to see a deeper dive into the legislation, ... | ||
SMBs more security-savvy but don't see themselves as targets ZDNet (blog) The latest survey on SMB security familiarity and postures by security company Symantec shows that about half of smaller companies are familiar with the sorts of cyber-security threats we are all up against. But at least half of them don't view ... | ||
NATO Working with Private Sector to Deter Cyber Attacks Tripoli Post As such, in order to help resist and deter new threats to international security through the multiplication of often sophisticated cyber attacks, NATO has been working with some of the world's biggest private cyber security companies to share knowledge ... | ||
| ||
PMC server hacked for bogus birth certificates Daily News & Analysis By DNA Correspondent | Place: Pune | Agency: DNA A serious breach of cyber security in the Pune Municipal Corporation (PMC) has come to light in which forged birth certificates were made by using a fake identity for the computer server of the civic ... | ||
The Next Osama bin Laden Already Has Your Social Security Number Huffington Post (blog) Late last month Janet Napolitano, Obama's homeland security chief, made some startling statements at a live event on cyber security sponsored by the Washington Post. For example, she said that hackers have "come close" more than once---maybe several ... | ||
Norman and OPSWAT to Host Anti-Malware Seminar at Washington Nationals ... WebWire (press release) – Norman Data Defense Systems and OPSWAT will host a breakfast seminar for cyber securityindustry professionals, exploring trends and innovation in malware analysis and research. The event will take place on Thursday, November 17 at the Red Porch ... | ||
| ||
Mobile shopping on the rise, security measures lacking VatorNews Technology has enabled us to enhance our shopping experience with the ability to research pricing, reviews, and product purchase options with ease not previously possible,” Michael Kaiser, Executive Director of the National Cyber Security Alliance said ... | ||
Too much social media networking: Paranoia of Big Brother surveillance may ... Network World The biggest cybersecurity agency in Europe peeked at the future, 2014, to predict the effects of online social media connectivity 24/7 and concluded that too much social networking could make you paranoid and feel like you are constantly under ... | ||
| ||
2011 Federal Government IT Priorities InformationWeek Government IT security and cybersecurity were ranked the No. 1 priority. Data center consolidation moved up a few notches on the list, while the Open Government Initiative moved down. One of the big changes in federal IT this year was the resignation of federal ... | ||
FAA embraces iPads more closely FierceGovernmentIT During the event, Cooper said the FAA is investigating a change of its cybersecurity model to center around data. "Nobody is after the device. You want the device? Here, I'll give it to you. Steal that--but if you can't get to the data, who cares? ... | ||
Ross Perot Jr | Geneva Convention-like pact is required on cyber security Livemint India will host the third global conference on cyber security next year. Perot Jr. was the chairman of Perot Systems Corp. when it was acquired by Dell Inc. in 2009 for $3.9 billion and is now a board member of Dell. He is also the chairman of a think ... | ||
DEBATE PREP: America the cyber sucker? CNN (blog) Renault's disingenuousness disclaimer could be the tag line for US cyber security policy. Just last month, the Director of National Intelligence delivered a report to Congress – "Foreign Spies Stealing US Economic Secrets in Cyberspace. ... | ||
Singapore Telecom : SingTel cloud security solution protects businesses from ... 4-traders (press release) (Nasdaq: SYMC) today announced the launch of the SingTel PowerON Security suite ofcloud-basedcyber-security solutions and services for businesses. SingTel PowerON Security offers enterprises comprehensive on-demand protection from viruses, malware, ... | ||
Politic?: Canada's Cyber-Security By Pieface We're sloppily trusting, to the extent that we allow ourselves to be manipulated by malign forces engaged in cyber-war activities. This is the message from one of Canada's primary security experts, Michel Juneau-Katsuya. Clever subversives ... Politic? | ||
Congress Should Amend SOPA to Address Cybersecurity, Due ... By Nicole Ciandella Unfortunately, missing from today's hearing was a substantive discussion of the practical implications of H.R.3261 for venture capital firms, Internet startups, and cybersecurity. While new legislation is urgently needed to combat rogue foreign ... Center for Technology and Innovation ... | ||
2012 Cyber Security Predictions from the Websense Security Labs ... By News Release Archive Websense predicts cybercriminals will use cyber-antics during the U.S. presidential election and will turn cell phones into ATMs. SAN DIEGO, Nov. 17, 2011 /PRNewswire/ -- With all of the crazy 2011 security breaches, exploits and notorious ... Websense News Releases | ||
New cyber-security rules for defense contractors – TMCnet ... By Blackmere New cyber-security rules for defense contractors – TMCnet. Published November 16, 2011. Nov 16, 2011 (The Yomiuri Shimbun - McClatchy-Tribune Information Services via COMTEX) -- Defense contractors will be obliged to immediately ... Blackmere Consulting | ||
Cyber Atlantic 2011 Shows Cyber Security Has No Borders ... By admin Cyber Atlantic 2011 Shows Cyber Security Has No Borders. by Sue Marquette Poremba, IT Business Edge. There are so many positives to having a borderless society, but it also means that cybercriminals can easily commit crimes anywhere ... Techno-News Blog | ||
Google: SOPA is pro-Internet censorship, stymies cybersecurity ... By Justin_Massoud Google: SOPA is pro-Internet censorship, stymies cybersecurity . On Wednesday morning, the House Judiciary Committee met to discuss bill H.R. 3261, better known as Rep. Lamar Smith's Stop. Club MyCE | ||
XE.com - Ex-US admiral raises cash for cyber security firm Ex-US admiral raises cash for cyber security firm. Top Articles. Glance-PRESS DIGEST - British ...(Reporting by Jim Finkle, editing by Matthew Lewis) Keywords: CYBERSECURITY ADMIRAL/. COPYRIGHT. Copyright Thomson Reuters 2011. ... XE Forex News | ||
Download Our Free Updated White Paper On Cyber Security | IT ... By kwright IT Governance CEO, and information security expert, Alan Calder, has written a white paper on 'Cyber Security: A Critical Business Risk' which is available for you to download, for free, now! ... IT Governance Blog on IT governance,... | ||
The Identity Theft Council contributes to the FCC's Small Biz Cyber ... By Neal O'Farrell According to a survey released in October, 2011 by Symantec and the National Cyber SecurityAlliance (NCSA), two-thirds of U.S. small businesses rely on broadband Internet for their day-to-day operations. However, the Symantec survey also found that 85 percent of small businesses think their companies are cyber-secure, but barely half of these businesses actually have a cybersecuritystrategy or plan in place and nearly 80 percent say they lack a written Internet security policy. ... blog.identitytheftcouncil.org | ||
UMD CyberSecurity Club » Blog Archive » Field Data Available at ... By rkirby@umdcsec.org The WINE data is relevant to research in security (e.g., to establish a rigorous benchmark for cyber security techniques), software reliability (e.g., to measure the impact of bugs in the real world), software upgrades (e.g., to determine if the broad ... UMD CyberSecurity Club | ||
Presidential Candidates Should Address U.S. Cybersecurity By James Carafano Cybersecurity is a weighty issue, one that should be addressed in the upcoming GOP presidential candidates debate dedicated to foreign policy and national security. ... @James Carafano. Tags:cyber security, defense, Heritage debate ... The Foundry: Conservative Policy... | ||
European Union and United States cybersecurity experts stress-test ... European Union and United States cybersecurity experts stress-test defenses. BBC 11/04/2011. This week's exercise in Brussels marked the first time the two ... www.nextgov.com/web_headlines/wh_20111104_1998.php | ||
The Cybersecurity Money Pit Despite the hundreds of millions of dollars the U.S. federal government spends on cybersecurity, it seems that shoestring-budget attackers are still often able to ... www.technewsworld.com/story/73703.html | ||
Cyber-security of continent's power grid 'chaotic,' report warns The cyber-security of the North American power grid is "in a state of near ... the NationalCybersecurity and Communications Integration Center believes the ... www.vancouversun.com/technology/Cyber.../story.html |
Follow @sobeqorg