Financial Post
If 2010 was the Year of Vulnerability to cyber crime, then 2011 was the year hackers took advantage of that vulnerability. Below, we take a look back over the past 12 months at some of the defining moments in hacker history. ...
Financial Post
Hack highlights debate over government versus business cybersecurity
Nextgov
In October, a report by the Internet security firm Symantec and the National Cyber Security Alliance said that companies with fewer than 500 employees are often ill-prepared to prevent cyberattacks, even though nearly half of attacks are aimed at small ...
Is Smart Grid Cyber Security a Losing Game?
IT Business Edge (blog)
The grid has long been a worry for cyber security experts. The MIT study reinforces those concerns and takes them a step further by indicating that ground is being lost despite the general acknowledgement of the problems and efforts by several federal ...
Those pesky passwords — cyber security has run amok
Enid News & Eagle
On Cyber Monday, the Monday after Thanksgiving, $1.25 billion was spent by bargain-hunting online shoppers. On Christmas Day, thanks to those apparently unhappy with the gifts Santa toted down their chimneys, cyber shopping jumped 16.4 percent. ...
M'sia needs to produce own cyber security software
New Straits Times
"Cyber security is the same as national security involving many operational aspects such as prevention, defence, detecting, intelligence and attack. "It also needs sophiscated technical knowledge in information security and continuous upgrading of ...
Holiday Week Security Fun From Top T-shirts to Tech Humor
Public CIO (blog)
Any funny cybersecurity stories or jokes you can share? Or, what's your favorite techie T-shirt? Happy New Year everyone, and thanks for reading in 2011! I'll be back next week with some 2012 predictions and government technology trends.
Chamber Raid: Hackers Target US Commerce Lobby
E-Commerce Times
Perhaps the chamber was the author of its own cybersecurity problems. It had circulated an internal draft document in May criticizing the White House's legislative proposals on cybersecurity as regulatory overreach, according to the Journal. ...
DHS buys software as part of Einstein 3 deployment
FederalNewsRadio.com
By Jason Miller The Homeland Security Department has been experimenting with the Einstein 3 intrusion prevention cybersecurity software for almost three years. Now it looks as if the agency is ready to move beyond the test phase. ...
Swecker Discusses Cyber Security, Attack on Stratfor
Washington Post
Dec. 27 (Bloomberg) -- Chris Swecker, chief executive officer of Chris Swecker Enterprises, talks about a cyber attack on security-analysis firm Stratfor by hackers claiming to be associated with the group Anonymous. He speaks with Jon Erlichman on ...
California Makes Strides With Grid Modernization
Renew Grid
... a cybersecurity working group may develop a set of goals or metrics that can be used by the CPUC to monitor the effectiveness of utility cybersecurity practices, and potentially form the basis for any future CPUC action on developing cyber-security ...
MVCC unveils new training lab
The Rome Observer
MVCC unveiled its new Cybersecurity Training Lab on Dec. 20 for use by students in the college's CyberJobs program. During a time when many are struggling to find jobs, the $2.8 million, three-year funded training grant is an example of a local success ...
'Who killed Snooki?'
North Brunswick Sentinel
Shreyas Chand and Brianna Mussman participated in the CSAW-VII Cybersecurity Competition at New York University- Polytechnic University, placing third in the nation in the High School Cyber Forensics Challenge. They had to solve a mystery by ...
December 2011: GovCloud Moves From Policy to Law
Forbes
One in particular is their recommendation for a National Office for Cyberspace (NOC) and a new National Security Council Cybersecurity Directorate (NSCCD). Along with the relevant agencies, these organizations would: “Assume expanded authorities, ...
DHS Secret Meet on Domestic Threats
Cryptome.org
Electromagnetic Pulse (EMP) Threat--Lessons Learned and Areas of Vulnerability, and Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal Advisory Committee Act, it has been determined that the meeting ...
Joining Trend, College Grows Beyond Name
New York Times
The goal is to offer master's degrees in industries like cybersecurity, health informatics and project management, matching programs with each city's industries and labor needs, through a mix of virtual learning and fly-ins from professors based in ...
New York Times
2011 & Beyond: Stakes Rise in Cyberwarfare
The Epoch Times
Although cyber-attacks against major companies had been common prior to that, the high-profile attacks brought the realities of cybersecurity into the spotlight. Meanwhile, the power of cyber-attacks in both military action and espionage became a ...
The Epoch Times
Happy New Year: You've Been Hacked
CFOworld
A widespread cybersecurity invasion by the hacking group called Anonymous targeted intelligence firm Stratfor, apparently stealing data belonging to corporate clients from Apple on down, to governmental entities that range from the Miami Police to the ...
Adam's 2012 Tech Predictions
SYS-CON Media (press release) (blog)
The geopolitics of cybersecurity will take center stage. Certain visitors from the Land of the Pandas have been stealing a lot of our things. We've known they are stealing our things for a while. So what's going to change? ...
Cloud Computing Security: Can the Cloud Ever Be More Secure than On-Premise?
Formtek Blog (blog)
VanRoekel said that “we cannot afford to make the false trade-off between cybersecurity and innovation. A lot of people will use cyber as a blanket excuse to not move forward, but I truly believe that moving to the cloud, and a move to the cloud of ...
Recall: Bright economy, dark places
San Antonio Current
As a leader in cyber security, San Antonio is home to many good tech jobs. It's the type of work where there's no room for gray areas. High school nerds, think twice before tweeting critically about Big Brother. You're either with the government or ...
San Antonio Current
A place to be seen, heard
Winnipeg Free Press
Donned in business attire such as suits and ties, the would-be legislators under 20 years old have been debating topics such as international military intervention, cyber-security and marriage laws. "I'm interested in politics because it really affects ...
New Generation Firewall for Highly Advanced Network Security
Business 2 Community
With such dependence, none of us wants to compromise with cyber security. Hackers will keep attacking your system to get what they want; this makes prevention, detection, and responding to the attacks significant. Firewall security is essential for ...
Great Decisions leads off with Middle East expert
Dunwoody Crier
In addition to Middle East realignment, this series includes the topics: promoting democracy, Mexico, cybersecurity, state of the oceans, exit from Afghanistan and Iraq, Indonesia, and energy geopolitics. A briefing book will provide background ...
Lockheed Martin Wins Contract Worth up to $2 Billion to Support the U.S. ...
MarketWatch (press release)
It is responsible for a wide array of information technology systems and services in areas such as health care, energy, transportation, information and cyber security, extreme environments, citizen protection and space exploration. ...
Police, NBI to be strengthened by cybercrime law
Business Mirror
The Cybercrime Prevention Act provides for the establishment of a Cybercrime Investigation and Coordinating Center under the Office of the President which will be tasked to formulate and implement a national cyber-security plan. ...
Military lowers cyber alert level to normal
Yonhap News
Under the heightened cyber alert in the past week, the military doubled the size of its staff handling network security and strengthened its coordination with the government's National Cyber SecurityCenter. Once Infocon is raised, headquarters and ...
Information Security and Privacy Advisory Board Meet
Cryptome.org
... --Discussion/updates on the National Strategy for Trusted Identities in Cyberspace (NSTIC), --Panel discussion on derived credentials, --Presentation on DHS updates and cybersecurity strategy, --Panel discussion on data feedback and network, ...
Cyber attacks target smartphones
The National
Yet mobile phones that run Google's Android operating system, in particular, "will suffer from more cyber criminal attacks", warns Trend Micro, a cyber security firm that recently released a report outlining predictions for attacks in the new year. ...
The National
Protective Gear For Wireless Devices Can't Stop Cybercrime
FOX Charlotte
While people buy covers to protect the outside of their tech toys, cyber security experts say little do they realize how easy it is to crack what is inside. "I mean, I'm not really worried about it, too much, I guess, if you have important stuff," said ...
Swecker Discusses Cyber Security, Attack on Stratfor - YouTube
By Bloomberg
Dec. 27 (Bloomberg) -- Chris Swecker, chief executive officer of Chris Swecker Enterprises, talks about a cyber attack on security-analysis firm Stratfor by ...
Uploads by Bloomberg
U.S. Department of Homeland Security National Cyber Security ...
27, 2011 /PRNewswire-USNewswire/ -- The SANS Institute announced today that Department of Homeland Security National Cyber Security Division and Idaho National Laboratory have won the 2011 U.S. National Cybersecurity Innovation ...
Virtual-Strategy Magazine - Your...
The Seventh Scam of Christmas, Phishing and SMiShing! | Blog ...
By Tracy Mooney
About Me. Tracy Mooney Chief Cyber Security Mom Tracy, a mother of three from a Chicago, Illinois suburb, is a regular mom with the same ... Read More. Feeds & Podcasts. Consumer Blog Feeds · Corporate Blog Feeds · Enterprise Blog ...
Blog Central » Cyber Security Mom
Swecker Discusses Cyber Security, Attack on Stratfor | www.bullfax ...
By marketmaker
Swecker Discusses Cyber Security, Attack on Stratfor. Dec. 27 (Bloomberg) -- Chris Swecker, chief executive officer of Chris Swecker Enterprises, talks about a cyber attack on security-analysis firm Stratfor by hackers claiming to be associated ...
Bullfax.com - Market News & Analysis
Coviello: '2012 Will Be the Year of Resiliency' | threatpost
By Guest Posts
National governments will prioritize cyber security. Across the globe we are seeing governments prioritize cybersecurity as both a national security and economic security issue. The growth in cyber-crime, the rampant theft of IP and other ...
threatpost - The First Stop for...
Group launches national cybersecurity awareness program ...
“The efforts of the Global Institute will further strengthen our collective cyber security strategy by providing focused research and programs that address our ...
healthcareitnews.com/.../group-launches-national-cybersecurit...
US-CERT Cyber Security Tip ST11-001 -- Holiday Traveling with ...
Cyber Security Tip ST11-001, archive ... For even more information about keeping your devices safe, read Cybersecurity for Electronic Devices. ...
www.us-cert.gov/cas/tips/ST11-001.html
Health info sharing center to lead cybersecurity education effort ...
Health info sharing center to lead cybersecurity education effort - Healthcare business news and research | Modern Healthcare.
www.modernhealthcare.com/article/20111226/.../312269964
The SEC Focuses on Cyber Security and Related ... - White & Case
Cyber Risk Factors – Cyber security risk disclosure must adequately describe the ... 1 -Cybersecurity is the body of technologies, processes and practices ...
www.whitecase.com/articles-12202011-1/
Benchmarking Opportunity — ENISA Releases Cyber Security ...
You are here: Home / Security / Cybersecurity / Benchmarking Opportunity — ENISA ReleasesCyber Security Incident Reporting Guideline Documents ...
www.continuitycompliance.org/benchmarking-opportunity-en...
Firms team for NATO cybersecurity work
21 (UPI) -- Italy's Finmeccanica and U.S. company Northrop Grumman have joined to help NATO boost its ability to quickly detect and respond to cybersecurity ...
www.istockanalyst.com/.../firms-team-for-nato-cybersecurity-...
Follow @sobeqorg