WEBSITES which revealed violations in Russia's elections were inaccessible . . . after a massive hacking attack their operators said was aimed at preventing the exposure of mass election fraud. Popular Russian radio station Moscow Echo and election monitoring group Golos said their websites were the victims of massive cyber attacks, while several opposition news sites were inaccessible. . . . "The goal of the attackers is clear," Anton Nossik, the media director of Livejournal owner SUP, wrote on his blog, alleging that the perpetrators are a "group of criminals" who are "probably fattened by the federal (Russian) budget".
US power grid needs cybersecurity protection: panel Reuters An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory in Idaho Falls, Idaho September 29, 2011. WASHINGTON (Reuters) - The threat of cyberattacks on the US power grid should be dealt with by a ... | ||
Global cyber security M&A deal value in H1 at USD 10 bn in 2011 Economic Times NEW YORK: The value of merger and acquisition deals in the cyber security space touched USD 10 billion globally in the first half of the year, a significant 70 per cent jump in comparison to the entire 2010 calendar year, according to global ... | ||
| ||
This Week in Tech: House gets down to business on cybersecurity The Hill (blog) By Gautham Nagesh - 12/05/11 09:50 AM ET The House Homeland Security Committee will be the latest panel to take up cybersecurity legislation on Tuesday as the lower chamber attempts to catch up with the Senate, which has debated comprehensive ... | ||
| ||
Survey warns of mobile cybersecurity during holiday season FederalNewsRadio.com A survey by the National Cyber Security Alliance and McAfee Security finds more people are using their home computers, smart phones and other mobile devices to do their holiday shopping this year. It's good news for cybercriminals who are out in force ... | ||
| ||
The Best Laid Plans GovExec.com By Brittany Ballenstedt bballenstedt@govexec.com December 5, 2011 While several federal agencies have or are working to address cybersecurity workforce planning, all face challenges in defining cybersecurity work and filling highly technical positions, ... | ||
House Small Business Subcommittee on Healthcare and Technology Hearing Insurance News Net (press release) My name is Michael Kaiser and I am the Executive Director of the National Cyber Security Alliance (NCSA). Thank you for inviting me to discuss the current state of cybersecurity and small businesses. Since its inception ten years ago, ... | ||
MS-ISAC Selects Qualys to Bring Cloud-Based Security and Compliance Solutions ... MarketWatch (press release) The MS-ISAC will deliver this service through its 24x7 cyber security operations center that provides real-time network monitoring, early cyber threat warnings and advisories, vulnerability identification and mitigation and incident response for the ... | ||
House Small Business Subcommittee on Healthcare and Technology Hearing Insurance News Net (press release) In this capacity, I am the senior manager responsible for NERC reliability compliance and cyber security. I bring over 30 years experience in the electric utility industry to these roles. While my testimony and remarks today are made on behalf of NCEMC ... | ||
Automatic cuts called 'catastrophic' for contractor dealmaking Washington Post Those involved in intelligence, cybersecurity or health care might be insulated from cuts and hold their value, he said. The automatic reductions will be “catastrophic'' for buyouts of contractors, because the cuts will lower company valuations and ... | ||
House Small Business Subcommittee on Healthcare and Technology Hearing Insurance News Net (press release) We appreciate the Subcommittee's interest in cyber security as it affects small business, which plays such a large part in the nation's economy. First I would like to provide some background on my experience, on McAfee andon SIIA. ... | ||
BART backtracks on cellphone service interruption FierceGovernmentIT Execution of the shutdown, according to emails (.pdf) obtained by cybersecurity researchers from Indiana University's Center for Applied Cybersecurity Research through the California Public Records Act appears to have been initiated via a single email ... | ||
Naming names in APT CSO By Bob Bragdon, Publisher, CSO Let's call a spade a spade: China is the greatest threat to international cybersecurity on the planet. I'm tired of pussyfooting around this issue the way that I, and many others in security, industry and government have ... | ||
House Small Business Subcommittee on Healthcare and Technology Hearing Insurance News Net (press release) I want to thank everybody for joining us today to discuss this important issue of cyber security. A special thanks to Representative Mac Thornberry and our panel of witnesses. We appreciate your participation. Our nation's digital infrastructure has ... | ||
Hackers to Expand Cybercrime Activity on Social Networks, Mobile Devices and ... MarketWatch (press release) Unfortunately, those new opportunities are often accompanied by new threats posed by cybercriminals bent on exploiting cybersecurity in new ways. Hackers have made significant gains in 2011, both in the number and quantity of data breaches they have ... | ||
| ||
| ||
US DHS Secretary's Remarks on the Importance of Strong International Homeland ... defpro This past April, I was in Budapest during the European Cybercrime Forum to discuss our partnership with the US Department of Justice and the EU under the auspices of the US-EU Working Group onCybersecurity and Cybercrime. ... | ||
Lookingglass Cyber Solutions Names Matthew Stern Chief Strategy Officer MarketWatch (press release) An established security industry veteran, Mr. Stern brings expertise in computer emergency response team operations, military operations in cyberspace, enterprise level cyber securitysolutions and information operations. "Organizations today in both ... | ||
E-book: A Holistic Approach to Fraud Management FierceFinance Banks face a punishing cyber security environment, one that's not going to change anytime soon. We get into security and fraud prevention issues often over on FierceFinanceIT and FierceComplianceIT. To further address these issues in more systematic ... | ||
Nevada PUC Sets Hearing on Smart Meters SmartMeters Specifically, worries over health and cyber security. NV Energy is installing 1.45 million digital meters, which use radio-frequency identification chips similar to those in cell phones to send usage data to the utility, which reports the smart meters ... | ||
Network Breaches Herald More Advanced Attacks in 2012 eWeek If 2011 was “the year of the hack,” as it was dubbed by Richard Clarke, former White House cyber-security czar, would 2012 be the year enterprises apply the lessons learned and stop the attacks? Apparently not, as security experts are predicting even ... | ||
Byte-size: Cyber crims slay 'fanpires' Stratford Press Cyber-security expert Norton has found that some Twilight web searches result in "poisoned" links coming up. These sketchy sites can result in viruses, keylogging programs or other internet baddies being downloaded to your PC. ... | ||
The Download: New firewall could limit how you use Facebook at work Washington Post Founded in 2001 in the Eldersburg home of Martin Roesch, the firm's chief technology officer, Sourcefire created an open-source cybersecurity software called Snort that has tallied nearly 4 million downloads to date. US companies comprise approximately ... | ||
Blue Ridge Networks Closes $1.7M Offering - cbl Citybizlist (press release) Blue Ridge provides cyber-security solutions to government and commercial enterprises. John brings almost three decades of high technology executive leadership to Blue Ridge. He was formerly the senior partner at SpaceVest Capital, a co-founder and ... | ||
| ||
| ||
| ||
Starring: Erica Martinson, Darren Samuelsohn, Darius Dixon, Darren Goode ... Politico The study reports that over the next few decades the grid will face difficulties in integrating renewable energy, siting new transmission lines and even maintaining its own cybersecurity, but it also offers suggestions to help the grid cope, ... | ||
This Week in Small Business: Are Consumers (and Jobs) Back? New York Times (blog) Booz Allen Hamilton lists 10 cybersecurity trends for financial services in 2012. NASA selects 300 small-business research and technology projects. American Express and some online merchants are giving away $20 million. ... | ||
U.S. power grid needs cybersecurity protection: panel | The Raw Story By Reuters In a report on the future of the U.S. electric grid, through 2030, the team recommended that the federal agency should work with industry and have the appropriate regulatory authority to enhance cybersecurity preparedness, response and ... The Raw Story | ||
Cybersecurity conference sidles into Denver Tech Center - tekhne By wendy norris Tekhne will be on hand to live blog the Cybersecurity Summit West and its star-studded roster of military, law enforcement and private security experts. Besides well-heeled defense contractors cashing in on the newly minted $60 billion ... tekhne | ||
House Hearing on Draft Legislative Proposal on Cybersecurity ... By Luke Pelican The House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies will hold a hearing tomorrow at 10 am on draft legislation that takes an information sharing approach tocybersecurity. The hearing will be ... Marvin Ammori | ||
Top HP Cybersecurity Exec Betsy Hight Interview: From Morse Code ... By Brynn Koeppen Betsy Hight: I lead the Cybersecurity Practice for Hewlett-Packard's U.S. Public Sector business. This business provides the right cyber security solution for our federal, state or local government clients, along with some higher education clients. ... News & Insight for the DC Area Executive | ||
Power to Homes, Businesses Faces Cybersecurity Threat, MIT Finds ... By Blackmere Power to Homes, Businesses Faces Cybersecurity Threat, MIT Finds – Bloomberg. Published December 5, 2011. The U.S. needs standards to guard against cyber attacks on power lines that run to homes and businesses, according to a ... Blackmere Consulting | ||
MIT Reports on US Power Grid Cybersecurity | SecureWorld Post By tom MIT Reports on US Power Grid Cybersecurity. By tom On December 5, 2011 · While acknowledging there is no absolute ... Connie Sadler on Advanced Persistent Threat/New Cyber Security Threats ... SecureWorld Post | ||
European Smart Grid Cyber Security 2012 updates: Staged cyber ... By SMi Group Ltd Utilities Division Blog site for the European Smart Grid Cyber Security Forum London March 12th and 13th 2012 ...“Utility cyber security is in a state of near chao... Agenda complete with some incredible speakers. ► October (3). Symantec join the European ... European Smart Grid Cyber Security... | ||
Bipartisan Cybersecurity Bill Seeks Prevention of Intellectual ... By joacosta Congressman Jim Langevin, member of the House Intelligence Committee and co-founder of Congressional Cybersecurity Caucus, is urging new bipartisan legislation. BaretNews | ||
UK Government Cyber Security Strategy: the industry responds UK Government Cyber Security Strategy: the industry responds. This article was featured in Info4 Security in November 2011. www.itgovernance.co.uk/download/ITG_Info4Security_281111.pdf. << Back ... IT Governance - Latest News | ||
We Are Not Paranoid: Protecting the Digital Oil Field | SecurityWeek ... By Eric Knapp In truly Critical Infrastructure, the ROI of cyber security is measured in human lives. While a ... I used to think of the “Smart Grid” as the pinnacle of my pseudo-paranoid call for cyber security because of the massive attack surface that it presents. ... SecurityWeek RSS Feed | ||
U.S. power grid needs cybersecurity protection: panel - Yahoo! News From Yahoo! News: WASHINGTON (Reuters) - The threat of cyberattacks on the U.S. power grid should be dealt with by a single federal agency, not the welter ... news.yahoo.com/u-power-grid-needs-cybersecurity-protection... | ||