New cybersecurity bill would foster sharing of online data between government ... Washington Post (blog) “They're just going to blow a hole through all the privacy laws on the books for cybersecuritypurposes,” said Michelle Richardson, legislative counsel for the American Civil Liberties Union. The Cyber Intelligence Sharing and Protection Act of 2011 ... | ||
BCS: Government cyber security strategy lacks framework PC Advisor By Antony Savvas | Computerworld UK | 30 November 11 The government needs to produce a "framework" for its recently published UK Cyber Security Strategy if it is to succeed, according to the BCS, The Chartered Institute for IT. ... | ||
New report reveals DHS cyber-security nothing 'specialized' Examiner.com However, multiple series are applied for cyber-security jobs, and none of the series identifies cyber-security as the only job responsibility. Consider an excerpt taken directly from the GAO report: "In many cases, employees with cybersecurity ... | ||
| ||
| ||
The effect of the Cyber Security Strategy on the ISP, and ultimately the end-user SC Magazine UK Of all of the proposals in last week's Cyber Security Strategy, most seemed to be government or public sector led with little direct immediate impact on UK plc. Apart from one section, where the government said it would 'work with internet service ... | ||
The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world Docuticker ... new and transformative programme to improve our game domestically, as well as continuing to work with other countries on an international response. Chapter 3 sets out where we want to end up – with the Government's vision for UK cyber security in 2015. | ||
2 signs DHS is turning the corner on cybersecurity GCN.com Weatherford, who became DHS' first deputy undersecretary for cyber security on Nov. 21, is the first technologist with hands-on cybersecurity experience in government and the private sector in a DHScybersecurity post, said Paller, director of research ... | ||
UK Conference to Encourage Government and Industry Cooperation in Wake of ... Sacramento Bee By Defence IQ As the government's new cyber strategy calls for the public and private sector to work more closely on information security, the Cyber Defence & Network Security conference in January brings together military cyber commands, government, ... | ||
As cyberattacks grow, take security seriously Network World No company wants to be the subject of the next headline about a cybersecurity attack or critical data loss. Losing business data or customer information takes a toll on your business' reputation and its pocketbook. While it is impossible to entirely ... | ||
| ||
Enabling security for co-ops Intelligent Utility That's one reason Frank Sams, manager of network systems for Flint Energies, is glad to be one of nearly two dozen co-ops participating in the Cooperative Research Network's (CRN's) smart grid demonstration project that has produced a cyber security ... | ||
Crying “Cyber Attack” in Illinois Smart Data Collective Jim Langevin, the founder of the Congressional Cybersecurity Caucus, lamented our state of preparedness and called the attack, allegedly the first against the United States with a kinetic effect, yet another “wakeup call.” The weakness of American ... | ||
Cyber threats appearing where even savvy users don't expect Computer Business Review Doctor Stephan Lechner, director general of the Institute for the Protection and Security of the Citizen, Joint Research Centre, European Commission, in a lecture to the Cyber Security Summit says that he believes Cybersecurity has finally 'gone ... | ||
New Jersey Trains New Class of Lawyers to Prosecute Cybercrime HSToday “I was trying to work with our New Jersey law schools to produce programming on cyber crimes andcyber security, which was an area in my judgment … really was not offered out there.” Meanwhile, an idea for a cybersecurity law project was stewing in ... | ||
CyberPatriot IV Prepares for Second Round of National High School Cyber ... Sacramento Bee CyberPatriot is the nation's largest high school cyber security challenge. This unique competition was designed to give students a hands-on learning experience in cybersecurity and inspire students to consider science, technology, engineering and ... | ||
Sourcefire's Immunet Anti-Malware Solution Surpasses 2 Million Endpoints Channel EMEA by Michelle Silva, Wednesday 30 November 2011 Sourcefire, Inc. (Nasdaq: FIRE), a leader in intelligent cybersecurity solutions, has announced that Immunet®, the company's advanced anti-malware solution, has surpassed 2 million installed endpoints. ... | ||
966 cyber crime cases reported in 2010: Sibal Zee News "With the increase in the increasing proliferation of IT and related services, there is a rise in the number of cyber crimes and cyber security incidents," Sibal said in a written reply to the Lok Sabha. According to data maintained by National Crime ... | ||
Mozilla amps up fight against anti-piracy and Internet protection bills Washington Post But the company also says that the measures could threaten cybersecurity. “Just like SOPA, this bill will create new cybersecurity risks and jeopardize the basic structure of the internet as we know it,” Mozilla wrote in a statement on its Web site. ... | ||
A small step for the UK Government ComputerWeekly.com (blog) Of course any investment in cyber security has to be welcomed, so we have to congratulate the chaps at the Cabinet Office for negotiating their way around the cutbacks. But let's keep this in perspective: £650 million is not an insubstantial amount, ... | ||
Technology News Governing (blog) According to a survey released in October, 2011 by Symantec and the National Cyber SecurityAlliance (NCSA), two-thirds of US small businesses rely on broadband Internet for their day-to-day operations. The Small Biz Cyber Planner will be of particular ... | ||
The Insider Threat Worst-Case Scenario SYS-CON Media (press release) (blog) This cybersecurity and privacy nightmare might seem implausible, but that's exactly what happened in Israel, where 9 million records, those of every living citizen and some deceased, were leaked online and eventually sold on the black market. ... | ||
SEC issues guidance on cybersecurity risks and incidents Lexology (registration) While not a formal interpretation, the guidance provides valuable insight into the sort of disclosure practices registrants should consider when evaluating their own cybersecurity (including risks and incidents). In particular, the Guidance clarifies ... | ||
DMI to Provide Enterprise-Wide IT Solutions for the Department of Veterans Affairs Sacramento Bee DMI was selected for this contract because of its deep expertise in IT strategy, cybersecurity, and program management. DMI will provide the VA with solutions that encompass a wide range of IT requirements, including: "We are very pleased to work with ... | ||
Company looks to help coordinate the fight against cloud-crime CenterBeam In an effort to help fight cybercrime in the cloud, Trend Micro, a computer security company, is looking to link up with the International Cybersecurity Protection Alliance to establish the "Global Cyber Nation" in Washington, DC The company said this ... | ||
Hackers accessed city infrastructure via SCADA – FBI Information Age Speaking at the Flemings Cyber Security conference in London, Michael Welch said the hackers could theoretically have dumped sewage into a lake or shut off the power to a shopping mall. "We just had a circumstance where we had three cities, ... | ||
Cybersecurity and the public company: keeping your disclosures safe and sound ... Lexology (registration) As companies begin the preparation of their year-end periodic reports, they are cautioned to closely review the Securities and Exchange Commission's (SEC's) recent guidance on disclosure obligations relating to cybersecurity risks and cyber incidents.3 ... | ||
Work on safe tweeting The Canberra Times New research from Telstra's cyber security team shows that bosses use social media to keep tabs on their workers and their behaviour outside of the office. After interviewing more than 1200 Australian employers, researchers found that one in five ... | ||
Kratos Partners With AlienVault to Enhance Cyber Security and Situational ... defpro 29 that its RT Logic subsidiary has entered into an exclusive partnership with AlienVault to design, develop and deliver new cyber security solutions for the Satellite Communications (SATCOM) industry. The goal is to help defense, government and ... | ||
Technology 'holds key to communications security' for firms Taylor Vinters Mark Dampster, associate of the Centre for Cyber Security, said it is not just the internet where companies have to be vigilant, but as the recent phone hacking scandal has shown, communications of all sorts must be tamper proof. ... | ||
The 2012 World Conference On International Telecommunications: Another Brewing ... Who's Who Legal Some countries are seeking to include cybersecurity and cybercrime provisions into this treaty so that the ITU can impose new regulations and establish itself as the organisational home for international cybersecurity policymaking. ... | ||
Cybercrime Victims Often Provide Access Unwittingly: Report Channel Insider Both are members of the Maryland Cybersecurity Center. Their work is thought to be one of the first looks at the relationship between computer-network activity patterns and computer-focused crime trends. "We believe that criminological insights in the ... | ||
Virtualisation creates data management challenges Ontrack Data Recovery Mark Dampster, associate of the Centre for Cyber Security, also warned that businesses need to be careful about increased security requirements when moving their data management processes to the cloud. Is your data asset getting out of sight? ... | ||
Stephen Cheetham | Bloomberg – Cyber Security | illustration news By stephencheetham A piece I did for Bloomberg to accompany an article on cyber security. Read more about… Bloomberg – Cyber Security · Tweet. Posted on November 30, 2011 by Stephen Cheetham | Portfolio | Website. | ||
Cybersecurity mainly male domain, geek image deters girls ... By Blackmere Cybersecurity mainly male domain, geek image deters girls – Calgary Herald. Published November 30, 2011. WASHINGTON - There were no lines for the ladies room. That was unusual for an event attended by thousands but typical in the ... Blackmere Consulting | ||
Cyber security bill promotes sharing of threat data – CNN Security ... By pambenson1 The House Intelligence Committee introduced legislation Wednesday designed to knock down the barriers that interfere with the federal government and the private sector sharing critical information about cyber security threats. The bill would enable the intelligence community to share classified information with the private sector while at the same time addressing the ... Post by: CNN Senior National Security Producer Pam Benson Filed under: Congress • Cybersecurity • Intelligence ... CNN Security Clearance | ||
White House, Congress Renew Cybersecurity Push – Bob Gourley By bobgourley “Some good news: just last week, we had a very encouraging meeting with a bipartisan group of Senators that ended with agreement to work together to enact cyber security legislation as soon as possible,” said Howard Schmidt, cybersecurity ... Bob Gourley | ||
Crisis Mapping and Cybersecurity – Part I: Key points | Diary of a ... By Anahi Ayala Iacucci In one of the sessions at ICCM, which was entirely focused on this subject, some very interesting issues came out, which will give me some more ground to explain why I think that almost 90% of the discussions on cyber-security tend to take a ... Diary of a Crisis Mapper | ||
Crying “Cyber Attack” in Illinois By admin Jim Langevin, the founder of the Congressional Cybersecurity Caucus, lamented our state of preparedness and called the attack, allegedly the first against the United States with a kinetic effect, yet another “wakeup call.” The weakness of ... CrucialPointLLC | ||
Cyber Risk Management and Misinformation | Big Fat Finance Blog By Eric Krell I read Washington Post article -- a piece of reportage describing yet another disturbing cyber security breach -- that ... ... This SEC guidance is critical because it allows market participants to weigh cybersecurity as an investment factor. ... Big Fat Finance Blog | ||
GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better ... determining the size of their cybersecurity workforce because of variations in how ..... vacant positions at the department's National Cyber Security Division ... www.gao.gov/new.items/d128.pdf | ||
Cybersecurity Requires Patches, Not a Vast Bill: Susan Crawford ... When cybersecurity problems arise, the best response is to adopt a patch as soon as it's available. You don't want to wait for an entirely new operating system to ... www.businessweek.com/.../cybersecurity-requires-patches-not-... | ||
Thales UK News | Thales welcomes UK Cyber Security Strategy as ... Thales welcomes UK Cyber Security Strategy as a foundation for growth The UK's national prosperity and national security depend on the digital domain – we ... www.thalesgroup.com/.../251111_Thales_welcomes_UK_Cyb... | ||
Approach to NERC Reliability Standards compliance and cyber ... KEMA outlines a structured approach to develop a successful cyber security program and meet NERC CIP Standards compliance. www.kemautilityfuture.com/a-structured-approach-to-nerc-reli... |