Bloomberg
North Korea Recalls Troops as South Korea Tightens Cyber Security Chung Sung-Jun/Getty Images South Korean soldiers walk along barricades at the military check point, near the demilitarized ...
Bloomberg
How To Manage the Weak Link in Cybersecurity: Humans
CRN (blog)
Jennifer Bosavage In today's information security environment, there can be little doubt that the human element is the weakest link in cybersecurity. Recent high-profile security compromises, including the RSA breach, started with targeted phishing ...
Finmeccanica and Northrop Grumman Announce a Teaming Agreement to Respond to ...
Newswire Today (press release)
The NCIRC will provide the capability to detect and respond to cyber security threats and vulnerabilities rapidly and effectively. The project is intended to meet the level of ambition of NATO Head of States as set out during the Lisbon Summit in ...
Frontier Communications Offers Last-Minute Holiday Shoppers Cyber-Security ...
MarketWatch (press release)
STAMFORD, Conn., Dec 19, 2011 (BUSINESS WIRE) -- Last-minute shoppers and post-holiday bargain hunters need to be alert to online scam artists, so Frontier Communications is reminding consumers of ways to avoid becoming victims of online identity theft ...
And the winners of the Cyber Challenge are...
GCN.com
The online competition is a collaboration of the SANS Institute and the Common Knowledge Scholarship Foundation as part of the US Cyber Challenge to identify future cybersecurityprofessionals. Scholarships were awarded to the top five national ...
2012 budget: DHS wins some, loses some
FCW.com
Meanwhile, cybersecurity and biosurveillance systems are among the programs gaining expanded funding. Overall, the consolidated spending bill approved by the House and Senate allocated $39.6 billion in base funding for the department, which is $111 ...
US - China Internet Concerns
Voice of America
Cyber security is a growing concern. Man-made threats to online activity are increasing in number, sophistication, and gravity. It is in the interest of both the United States and China to ensure that these threat actors are not able to launch cyber ...
Stolen Credit Cards Go for $3.50 Each at Online Bazaar That Mimics Amazon
Bloomberg
(SYMC), the cybersecurity firm, estimates that cyberthieves steal data worth $114 billion a year. By comparison, the Federal Bureau of Investigation said the take from all bank robberies in the US in 2010 was just $43 million. ...
Bloomberg
Online Voting, London Olympics and Infrastructure Cyber Attacks Top IID ...
MarketWatch (press release)
Iran appears to have more advanced cyber security capabilities than formerly thought, and the US, European countries, and many other nations are ramping up their "offensive" cyber securitycapabilities and updating polices to allow for their deployment ...
Senate Budget Bill Includes Funding for Multitude of La. Priorities
Insurance News Net (press release)
Cyber Security: Sen. Landrieu $443 million for cyber security and cyber education. This funding supports cyber security workforce development and the Cyber Innovation Center (CIC) in Bossier City, La. , which has been an integral part in the Department ...
Conference Shares Critical Information and Best Practices on Cyber-related Issues
Sacramento Bee
The Air Force Association's 2012 CyberFutures Conference provides a unique platform for cyber security and technology professionals to convene, and fosters the development of strategies to approach this growing security threat. ...
1105 Media Hires Daniel McKinnon to Lead Government Events Division
EXPO Magazine
The division includes the flagship government technology event FOSE, as well as conferences on Infosharing; Cybersecurity, Mobile Enterprise and Cloud & Virtualization; and Enterprise Architecture and Big Data. “Given 1105 Media's focus on expansion in ...
NATO issues cybersec tender
SC Magazine Australia
By Darren Pauli on Dec 20, 2011 7:13 AM The North Atlantic Treaty Organisation (NATO) has issued a $42 million contract to build cyber security capabilities. The Wall Street Journal reported the deal, valued at less than the cost of a single fighter ...
Clarkson shows off new technology laboratory
WatertownDailyTimes.com
From smarter prosthetic limbs to advances in cybersecurity, students and faculty will use the $4 million facility to tackle cutting-edge problems. “This is not only fascinating but amazing,” said Mr. Griffo, R-Rome, who helped secure nearly $1 million ...
Insurance has key role in battling cyber risks: Analysis
Business Insurance
While most companies still do not buy cyber liability insurance despite the widely acknowledged serious threat that cyber risks and cyber security present, the Insurance Information Institute says that is changing. The white paper released last week, ...
More in Security Cats Blog:
SC Magazine UK
While North Somerset Council and Worcestershire County Council received ICO fines for "serious email errors", the Government announced its Cyber Security Strategy that will open a new nationalcyber security 'hub', a cyber crime unit within the ...
NSP acquires Summit Solutions, names new CEO
Washington Technology
Summit offers services to the federal government including strategic planning, cybersecurityanalysis and intelligence systems engineering services. Financial details of the deal were not disclosed. National Security Partners said the deal complements ...
Gov't Publishes Open Source Procurement Advice
TechWeekEurope UK
(The CESG is the cyber security arm of the UK intelligence services.) “The purpose of this toolkit is to ensure that there is a level playing field for open source and proprietary software and that some of the myths associated with open source are ...
TechWeekEurope UK
Who's playing dirty online?
Russia Beyond The Headlines
Indeed, the week before, Baroness Neville-Jones, Britain's former minister for security and counter-terrorism and now the Prime Minister's special representative to business on cyber security, ramped up the rhetoric. She said Beijing and Moscow were ...
Russia Beyond The Headlines
Rising cybercrime pushes African governments to take action
IDG News Service
"Our main goal originally was to raise awareness of cybersecurity issues and set some framework with the support of the Internet technical community. We had two workshops with law enforcement agencies on IP forensics and how law and technology should ...
DHS Discloses Privacy Protection Hides Spying
Cryptome.org
... of security-relevant network operations data and (b) technology developers and evaluators who can use this data to accelerate the design, production, and evaluation of next-generation cyber securitysolutions, including commercial products. ...
Frontier Communications Offers Last-Minute Holiday Shoppers Cyber-Security ...
Business Wire (press release)
Make sure your PC is safe. Have the most up-to-date security software and firewalls. In addition, back up your data and put identity theft protection on your PC. Frontier Communications offers this service to all online users nationwide – no matter ...
FCC official delivers warning on threat to 'Internet freedom'
Washington Times
Governments under the treaty would have greater authority to regulate rates and local access, and such critical emerging issues as cybersecurity and data privacy standards would be subject to international control. Mr. McDowell said the treaty could...
Washington Times
Common Security Mistakes Made by SMBs
IT Business Edge (blog)
To actually start defending yourself though, you may first want to read my post on FCCcybersecurity tips for small businesses. There are a few problems on this front, which include using easily guessed passwords and excessive reuse. ...
Sidoti Analysts Initiate Coverage on Dynamics Research (DRCO)
LocalizedUSA
DRC offers services to its customers in areas, including IT, logistics and readiness, information assurance and cyber security, homeland security, healthcare and space. Its customers include the Department of Defense (DoD), the Department of Homeland ...
Jared Polis Criticizes 'Stop Online Piracy Act,' Notes SOPA Enforcement Is ...
Huffington Post
As lawmakers debate the Stop Online Piracy Act (SOPA), an act Polis has criticized for "the harm it could do to legitimate online commerce and innovation, free speech, cybersecurity, and the technical infrastructure of the internet," the representative ...
2011: Dangerous Living Online
IRISHDEV.com
The scammers know that the human factor has always been the weakest link in cyber-security because of people's curiosity, and this is why social media and networks are so appealing for the cybercrim because while advanced technologies are constantly ...
IRISHDEV.com
SAIC Awarded Contract by the U.S. Space and Naval Warfare Systems Center Atlantic
Sacramento Bee
... FORTUNE 500® scientific, engineering, and technology applications company that uses its deep domain knowledge to solve problems of vital importance to the nation and the world, in national security, energy & environment, health, and cybersecurity. ...
Automatic updates for Internet Explorer to be carried out
Hostway
Mark Dempster, associate of the Centre for Cyber Security, recently suggested that the majority of firms could be unaware they have a problem with data protection and that some may fail to realise when data is lost or when operations have been ...
Hostway
NATO expanding cybersecurity abilities
Motley Fool
NATO is accepting bids from leading defense contractors including Lockheed Martin (NYSE: LMT ) and Northrop Grumman (NYSE: NOC ) to help expand NATO's cybersecurity abilities. Other potential bidders could include technology companies IBM (NYSE: IBM ) ...
APTs: Unfortunately, There Is No Silver Bullet Solution
Network World
Under these conditions, it is probably not surprising that these firms are also increasing theircybersecurity budgets on a regular basis. I realize this is a high-level summary – I could write volumes on each one of these 7 areas myself. ...
First EU-report on Maritime Cyber Security
By Lee J
ENISA has published the first EU report ever on cyber security challenges in the Maritime Sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cyber security. Finally, high-level ...
Cyber War News
Capitol Hill Sees a Flurry of Cybersecurity Bills to End 2011 | Blogs ...
By webadmin@itbusinessedge.com
Emerging Cyber Threats for 2012 Although there has been plenty of news about what Congress has not done in the waning days of 2011, you cant say that there hasn.
Sue Marquette Poremba
Zen One: DHS Cybersecurity Strategy and New California eCrime Unit
By noreply@blogger.com (Steve)
I. The Department of Homeland Security has released a new cybersecurity strategy document with a two-pronged approach: Protecting critical infrastructure today; Building a more secure cybersecurityecosystem for the future. Download the ...
Zen One
Small Businesses Ignore Cyber Security
By arieanna
According to a survey from the National Cyber Security Alliance and Symantec conducted earlier this year, the majority of small and medium-sized businesses (SMBs) believe that they are “safe” fromcyber security threats – despite a lack of ...
The Absolute Software Blog
No “SOPA Fight” Ruling Until New Year? | Beanstalk's SEO News Blog
By Kyle Krenbrink
Texas Republican Representative Lamar Smith stated on Friday that he would consider a hearing or a classified briefing on the bill's potential impact on cyber-security. The new bill has raised concerns from over 80 Internet engineers and ...
Beanstalk's SEO News Blog
Local college aims to be cybersecurity hub - FederalNewsRadio.com
Federal News Radio - Your source for federal news, now.
www.federalnewsradio.com/?nid=241&sid=2670880
House cybersecurity bill would establish federal overseer :: TeaParty ...
The bill would clearly delineate the cybersecurity functions of the Department of Homeland Security by requiring DHS to evaluate cybersecurity risks for critical ...
www.teaparty.org/article.php?id=1920
The New US “Blueprint” for National Cyber Security | Atlantic Council
The New US “Blueprint” for National Cyber Security ... To enhance general cybersecurity – including corporate networks, home users, and everyone in between ...
www.acus.org/new.../new-us-“blueprint”-national-cyber-securi...
HP Blogs - 2 cyber security tips: Spreading holiday cheer alo... - The ...
Cyber security is a 365x24x7 problem or job depending on how you look at it. However, during peak periods such as holidays, the nefarious cyber actor has a lot ...
h30507.www3.hp.com/t5/HP-Networking/2.../103949
Follow @sobeqorg