Deltek: Cybersecurity spending should grow
Washington Post
Cybersecurity spending. Agencies have little choice but to beef up budgets. The number of federalcybersecurity incidents reported to the Department of Homeland Security's US Computer Emergency Readiness Team has jumped 659 percent since 2006. ...
|
White House Cyber-Security Priorities Revealed
CIO Insight
The Obama Administration has outlined its road map of priorities for government agencies that sponsor research and development on cyber-security. The plan is the result of seven years of examination and consideration by cyber-security experts in both ...
|
The Cybersecurity “Wake Up Call” and the Snooze Button
SYS-CON Media (press release) (blog)
While Alex has dealt rather masterfully with the consequences of the trumped-up Russian SCADA hacking incident, I'd like to point to a different aspect of it: the cybersecurity “wake up call.” The Springfield incident was immediately called a “wake up ...
|
UK Cyber Security Strategy 'lacks' plan of action
Acumin
There are a number of good points about the new UK Cyber Security Strategy, but it does not state exactly how such problems are going to be tackled. This is according to the chief technology officer at Imperva, Amichai Shulman, who explained that some ...
|
Congress Pushes Bills To Promote Cybersecurity
North Country Public Radio
by Martin Kaste Dec 9, 2011 (All Things Considered) — Congress isn't doing much -- with the major exception of cybersecurity. Citing rare bipartisan agreement and a common sense of purpose, members of both parties are advancing bills designed to ...
|
Nigeria investigates ZTE cybersecurity contract
IDG News Service
Nigeria's lawmakers have given the go-ahead to a joint committee of police, public procurement, debt management and IT officials to investigate China's ZTE over a $470 million contract for the Nation Communication Security System. ...
|
2008 Computer Breach Brings New Cybersecurity
NewsMax.com
By Henry J. Reske A 2008 breach of a US military classified computer network sent investigators scrambling and led to major changes in cybersecurity. Pentagon officials consider the October 2008 incident the most serious violation of its computer ...
|
China 'working hard' to develop IT sector, ensure cyber security
China Daily
By Tan Yingzi (China Daily) WASHINGTON - As one of the major Internet powers in the world, China is willing to work with the United States to advance the development of information technology and fight cyber crime, a senior Chinese information official ...
|
Pace launches cyber security institute
Westfair Online
Pace University's Seidenberg School of Computer Science and Information Systems said it is opening an institute to address the need for more advanced training in the field of cyber security. Starting in the fall 2013, the Seidenberg Cyber Security ...
|
Developing countries most vulnerable to cyberattacks – UN
UN News Centre
Developing countries are at higher risk of being the target of cyberattacks, a United Nations-led forum on cybersecurity heard today, where experts discussed ways to mitigate this phenomenon at the national and international levels. ...
| |
|
The Sky Isn't Falling, But the Internet Might
Insurance Networking News
The broader GAO report, “Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination,” examined threats to federal information technology (IT) infrastructure and systems, which the report says continues to grow in number and ...
| |
|
US electric grid at risk?
UPI.com
Cybersecurity vulnerabilities can arise from weaknesses in personnel, processes, technology and the actual physical environment, says, the "Future of the Electric Grid" report by the Massachusetts Institute of Technology. "Millions of new communicating ...
|
|
US, Russia work to expand cyberspace cooperation
Reuters UK
Howard Schmidt, the White House cybersecurity coordinator, said in a July 12 blog that the United States and Russia planned to have three types of cybersecurity-related cooperative mechanisms in place by the end of this month, including special "24/7" ...
|
All of TIME.com
TIME (blog)
That's how much the world is going to spend on cyber-security in 2011, according to a new analysis by PricewaterhouseCoopers. And, unlike most defense spending, it's going up. If you're looking to get in on the action by buying a cyber-security firm, ...
|
|
US Steel spent $800000 in 3Q gov't lobbying
CBS News
The proposals included standards for chemical facilities and cybersecurity. Other topics included appropriations for infrastructure and other transportation projects, enforcement of US trade laws, offshore leasing, tax issues and workplace safety. ...
|
Perhaps SOPA Should Be Called The Stop Online PRIVACY Act
Techdirt
Critics of the Stop Online Piracy Act and its Chinese Firewall approach to combatting Internet piracy have hammered the ill-advised legislation for the predictable damage it would inflict on cybersecurity, innovation, and above all, free speech. ...
|
Sourcefire Announces Next Generation Firewall
Dark Reading
About Sourcefire Sourcefire, Inc. (Nasdaq:FIRE), a world leader in intelligent cybersecuritysolutions, is transforming the way global mid- to large-size organizations and government agencies manage and minimize network security risks. ...
|
Uncertain Rules of Engagement in Cyberspace
Lawfare (blog)
by Robert Chesney Ellen Nakashima of the Washington Post, whose reporting on cybersecurityissues (including counterespionage and offensive computer network operations) is indispensible, had an extraordinary piece yesterday concerning an episode that ...
|
Cyber threat clearinghouse key to national security
FCW.com
Private industry owns 85 percent of the country's critical infrastructure and deploys far morecybersecurity experts than the government ever will. The Homeland Security and Justice departments counter cyber threats, but much more should be done. ...
|
Over half UK population are victims of cybercrime
Techwatch
State of the Nation was published last month and acknowledges that the government have now made cybersecurity a priority, labelling it a top-tier threat and recently allocating £650 million to various departments to help fight the cybercrime menace. ...
| |
|
Hacking for the greater good
Livemint
The government has a number of organizations that work in the field of cyber security. This includes both organizations within the Armed Forces and the civilian fields, but there is a strong need to build a trusted group of experts to call upon. ...
|
Agency to Host Workshops on Cyber-Physical Systems
GovInfoSecurity.com
NIST also announced its Information Technology Laboratory's Computer Security Division will host a two day conference to explore the cybersecurity needed for cyber-physical systems. NIST Special Publication 800-155, BIOS Integrity Measurement ...
|
|