Cybersecurity bill approved by House panel Reuters (Reuters) - A bill to let US spy agencies share intelligence on cyber threats with private companies was backed by a House of Representatives intelligence panel on Thursday. In a 17-1 vote, the Permanent Select Committee on Intelligence approved the ... | ||
Cyber Security Spending to Hit $60 Billion in 2011 eWeek Since 2008, the total investment in global cyber security deals has exceeded $22 billion, the PwC report found. Global cyber security spending is expected to reach $60 billion in 2011 and is forecast to grow at 10 percent every year during the next ... | ||
| ||
| ||
Did Conficker help sabotage Iran's nuke program? Reuters "He is a smart man," said Tom Kellermann, an advisor to the Obama Administration on cyber security policy and the chief technology officer of a company called AirPatrol. His analysis challenges a common belief that Conficker was built by an Eastern ... | ||
AFCEA Educational Foundation's Professional Development Center (PDC) Expands ... Sacramento Bee The Instructor for these first five sessions is a former Chief Strategist at Netscape with a comprehensive background in cyber security. He has served for six years as a Science and Technology Advisor to the Johns Hopkins University Applied Physics Lab ... | ||
Cyber security program planned for Dec. 6 KPCnews.com ANGOLA — The Trine University Electrical and Computer Engineering Department will host a cyber-security awareness presentation Dec. 6 at 7 pm in Fabiani Theatre in the University Center on the main campus in Angola. The event is free and the public is ... | ||
More than $60bn spunked on cyber-security in 2011 Register By John Leyden • Get more from this author Global cyber-security spending is on track to exceed $60bn for 2011, according to a study by management consultants PwC. The growing tide of cyber threats, coupled with greater vulnerabilities due to the more ... | ||
Verizon-Supported Cybersecurity Bill Advances in U.S. House Bloomberg Cable, Internet and telecommunications providers have backed the legislation allowing them to share information with the government on a voluntary basis, while giving corporations access to classified intelligence on cybersecurity threats so they can ... | ||
Ascent Data to Participate in Duquesne University "Cyber Security Executive ... Sacramento Bee ... understanding cyber security insurance, and implementing best practices. Panelists will include Joseph H. Jones, COO at Ascent Data, Richard Archer, partner in advisory services at KPMG, David Brown, president and CEO of Business CyberSecurity, ... | ||
House Hearing Looks at Small Business Cyber Security State Journal "The broad range of issues being considered includes establishing a national standard for reporting a cyber breech, strengthening criminal statutes and requiring some private industries to develop cyber security plans." Rep. Mac Thornberry, R-Texas, ... | ||
Plans to strengthen cybersecurity in the US The H Rogers said that the law is intended to provide a basis for better cooperation on cybersecuritybetween government and businesses. The National Cable and Telecommunications Association (NCTA) praised the bill for avoiding an extensive regulatory system ... | ||
$60 Billion Spent on Cyber Security in 2011 Reveals Study ITProPortal In 2011, the expenditure on cyber security will hit $60 billion as businesses across the globe are looking for new ways to protect themselves against online threats that are increasing day by day. This fact was revealed in a study from PwC consultancy. ... | ||
GAO Dings Federal Management of Cyber Security Work Force IT Business Edge (blog) Today, there is little consistency in how cybersecurity work is defined or described throughout the federal government and the nation. The absence of a common language to discuss and understand the work and skill requirements of cybersecurity ... | ||
Booz Allen lists top 10 cyber security trends for financial firms FierceFinanceIT To raise awareness, Booz Allen has published the top 10 financial service cyber security trends for 2012. We get into these issues fairly often over on FierceComplianceIT. The trends include the growth of mobile devices, social media and cloud ... | ||
All hail Estonia? SC Magazine UK This week at the Cyber Security Summit in London, a statement was made by one of the key speakers that caught the attention of delegates, press and other speakers alike. Major General Jonathan Shaw, head of the defence cyber operations group at the MoD ... | ||
Cyber bill strong on info sharing, light on privacy protections GCN.com Andy Purdy, former head of the Homeland Security Department's National Cyber Security Division and US-CERT, called the bill an “important step forward” that begins the process of establishing a framework for information sharing. ... | ||
Finance industry trade group adds cybersecurity expert The Hill (blog) By Gautham Nagesh - 12/01/11 02:48 PM ET Former Morgan Stanley managing director John Carlson has joined BITS, the technology policy division of the Financial Services Roundtable to leadcybersecurity initiatives for the financial industry. ... | ||
Comment on the UK Cyber Security Strategy Continuity Central (press release) The problem has been analysed correctly and the right strategic goals have been identified. For instance, for the first time, we see an emphasis on protecting data and intellectual property versus the past emphasis solely focused on network security. ... | ||
Air Academy FCU's Strebe Urges Changes In Cyber Security Laws Credit Union Times Strebe, whose credit union has $420 million in assets and $42000, said any law to improve cyber security should include: Have merchants pay the costs when they experience a data breach; mandate that merchants display their data security policy; ... | ||
| ||
Obama Fortifies Efforts To Protect Critical Infrastructure InformationWeek One such effort is the Defense Industrial Base (DIB) Cyber Pilot, in which the DOD and DHS are working with Internet service providers and defense contractors to share classified information about cyber threats to provide stronger cybersecurity ... | ||
Online code-breaking test could get you a job at GCHQ Naked Security Despite the campaign starting in early November, it now sits against the backdrop of the last week's UK Government Cyber Security Strategy (GCSS). This policy document highlights many cyber-threats to the UK, a Tier 1 priority for national security, ... | ||
National Security Database to help prevent cyber war Daily Pioneer The NSD will act as a repository of cyber security experts and ethical hackers across the country to counter any mass attacks on cyber networks. The need for such a body like the NSD was felt after the Mumbai terror strikes in which the terrorists used ... | ||
AFCEA conference is expecting strong growth in second year San Antonio Business Journal San Antonio's growing prominence in the field of cyber security is expected to boost attendance this year for the 2nd Annual AFCEA Conference and Expo. The Alamo Chapter of the Armed Forces Communications & Electronics Association (AFCEA) will kick off ... | ||
Fact Sheet on the United States' Relationship with the European Union: An ... eNews Park Forest --This year the US and EU launched a program for immediate joint awareness raising initiatives, which led to an exchange of information during US National Cyber Security Awareness Month, and development of a roadmap towards synchronized annual ... | ||
Data Security Critical, Hold Merchants to Same Standards Insurance News Net (press release) On behalf of the Credit Union National Association (CUNA), I am writing regarding today's hearing entitled, "Cyber Security: Protecting Your Small Business." This is a very important and timely subject and we welcome the opportunity to file a statement ... | ||
Cloud hosting is secure, businesses told Global Gold Internet Services Mark Dampster, an associate of the Centre for Cyber Security, said companies are still able to keep data secure when using cloud hosting services. Cloud hosting providers offer all the usual secure, authenticated paths for the users of the service ... | ||
Top 10 Security Mistakes SMBs Make Dark Reading According to Symantec's SMB Threat Awareness Poll released in October, 85 percent of SMBs believe their company is safe from hackers, viruses, malware or a cyber-security breach, yet research shows SMBs are quickly becoming the largest targeted group ... | ||
Cyber security proposal changed to meet White House privacy ... By cnnrs (CNN) -- The House Intelligence Committee made some revisions in its cyber security bill Thursday to address privacy concerns raised by the White House. CNN Political Ticker | ||
Morning Smoke: Bipartisan Cybersecurity Bill Hopes to Get ... By Project On Government Oversight MORNING SMOKE Where there's smoke, there's fire. POGO's Morning Smoke is a collection of the freshest investigations, scoops, and opinions related to the world of government oversight. Have a story you'd like to see included? Contact ... The Project On Government Oversight... | ||
Cyber security proposal changed to meet White House privacy ... By Adam Levine By Pam Benson, CNN Senior National Security Producer The House Intelligence Committee made some revisions in its cyber security bill Thursday to address privacy concerns raised by the White House. ... The information can only be used by the feds to protect national security and/or for acybersecurity purpose. The private sector is neither required to share cyber threat information with the government nor must it do so to receive cyber intelligence from the government. A second ... CNN Security Clearance | ||
Process for cybersecurity must be followed | Simply Security By Simply Security As 2011 comes to a close, it's clear looking back that cybercriminals demonstrated an affinity for targeting companies and their data throughout the year. Simply Security | ||
Cybersecurity bill approved by House panel – Bob Gourley By bobgourley Cybersecurity bill approved by House panel. December 2, 2011 By bobgourley Leave a Comment. In a 17-1 vote, the Permanent Select Committee on Intelligence approved the legislation that would expand a pilot Pentagon program for ... Bob Gourley | ||
Global cyber security spending to grow 10 percent a year ... By RSS Feed In the first half of 2011, there were 37 deals accounting for over$10 billion in deal value, representing a 70 percent increase compared to full year 2010. Since 2008, the total investment in global cyber security deals has exceeded $22 billion, ... Clearing and Settlement — Clearing... | ||
Cyber security proposal changed to meet White House privacy ... By Blackmere The House Intelligence Committee made some revisions in its cyber security bill Thursday to address privacy concerns raised by the White House. The legislation is designed to improve information sharing between the federal government ... Blackmere Consulting | ||
Top Cyber Security Trends for 2012: #8 - Imperva Data Security Blog By Rob Rachwald Our other trends are here: Nine Eight Seven Six Five Four Three Two One On December 14th, Imperva's CTO Amichai Shulman will be hosting a webinar, talking you through the ADC's predictions. To register, click here. Trend #8: HTML 5 ... Imperva Data Security Blog | ||
New Cyber Security Requirements & Guidelines – Now Available to ... By Melanie Watson Make December YOUR Cybersecurity Month with These Essential Reads ... ISMS auditing is a crucial part of cyber security, giving firms an essential inspection of their information security systems. ISO/IEC 27007:2011 provides guidance on ... IT Governance Blog on IT governance,... | ||
Head in the cloud | Inspire. Change. By Beth English Dr. Nir Kshetri has become a go-to source for cybersecurity. When Dr. Nir ... Previously, few researchers were interested in cybersecurity. ... Kshetri was one of the first people to researchcybersecurity, especially from a business perspective. ... Inspire. Change. | ||
Avoiding the Cyber Crime Holiday | Shelly Palmer Digital Living By Hemu Nigam Just as a manufacturers takes steps to ensure that the products they make are safe for consumers, businesses that engage in online sales must give cyber security the same level of importance. Hackers will check how easy it is to break into a ... Shelly Palmer Digital Living | ||
NewsDaily: Insight: Did Conficker worm help sabotage Iran's nuke ... By Jim Finkle A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious "worm" that surfaced in late 2008 and infected millions of PCs. NewsDaily: Top Headlines | ||
United Nations Exposed as liers by TeaMp0isoN By Lee J I personally think 2011 is just the start of many years of cyber security problems and as we try to automate and integrate everything its just going to become more and more complex. Anyways heres the leak: http://pastebin.com/apt2qhR4 ... Cyber War News | ||
U.S. GAO - Cybersecurity Human Capital: Initiatives Need Better ... In light of the importance of recruiting and retaining cybersecurity personnel, GAO was ... Finally, the robustness and availability of cybersecurity training and ... www.gao.gov/products/GAO-12-8 | ||
Congressional approval of cybersecurity bill looks promising ... “For that reason, it is my intent to bring comprehensive cyber security legislation to the Senate floor for consideration during the first Senate work period of next ... www.homelandsecuritynewswire.com/dr20111201-congressio... | ||
Cyber Security: Protecting Your Small Business | House Small ... Cyber Security: Protecting Your Small Business. On Thursday, December 1 at 1 00 p.m., the Subcommittee on Healthcare and Technology of the Committee on ... smallbusiness.house.gov/Calendar/EventSingle.aspx?EventID... |