White House Sets Cybersecurity R&D Priorities InformationWeek By Elizabeth Montalbano InformationWeek The White House has released a roadmap that sets research and development priorities for cybersecurity to accelerate efforts to secure US network infrastructure and catalyze change in the way the nation ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Better cyber security needed as electric grid expands: MIT report Business Insurance The future characteristics of the US electric grid make it especially important to develop plans for improved cyber security, says a study by the Massachusetts Institute of Technology. “With rapidly expanding connectivity and rapidly evolving threats, ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Langevin announces cyber-security contest winners Boston.com Jim Langevin (LAN'-jih-vin) has announced the winners of a Rhode Island cyber-security contest for high-school students. Langevin on Wednesday said Adam Sowden, a student at Exeter West Greenwich Regional High School, took top honors in the Rhode ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
NIST 2012 budget spotlights cybersecurity GCN.com A National Cybersecurity Center of Excellence to be housed at NIST is funded to the tune of $10 million for the year, and $16.5 million is appropriated to support the administration's National Strategy for Trusted Identities in Cyberspace, ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Privacy concerns over House Intelligence cybersecurity info sharing bill FierceGovernmentIT 1 legislation (HR 3523) that would set up a cybersecurity threat information sharing mechanism between the intelligence community and the private sector. The bill continues to come under criticism from privacy advocates however, despite the inclusion ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
UK Cyber Security Strategy does not help secure the individual eGov monitor By Amichai Shulman, CTO and Co-founder of Imperva The UK Cyber Security Strategy analyses the problems and defines the goals well but it lacks a definite plan of action to achieve those aims says Amichai Shulman. The UK recently released a new strategy ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
House Cyber Panel Chair Proposes Placing DHS in Charge of Cybersecurity ExecutiveGov Cybersecurity legislation appears to be the main topic on Capitol Hill of late as Congress heads toward adjourning for the year. Last week, the House Intelligence Committee approved a bill that would allow private companies to share cyber threat ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
GTRA announces SecureGOV Council Meeting Government Award winners PR NewsChannel (press release) Sharing her insight and expertise and the importance of the collaboration of both private and public sectors to create solutions in the areas of cyber security included her opening keynote, 'DHS: YourCyber Security Partner,' Roberta Stempfly, ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Companies can insure against cybercrime. FederalNewsRadio.com The Chubb Group of Insurance Companies is adding cybersecurity insurance to its portfolio, according to InsuranceNewsNet. The company says the new cyber coverage will help protect private companies against damages and liability if they're ever hacked. ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Talking Cyber in Phoenix Electric Light & Power (blog) This week at the Grid-Interop conference in Phoenix, experts discussed practical implementations ofcybersecurity in a session focused on solutions and practices. In the session, Russ Silva from Telcordia Technologies noted that utilities are currently ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Glilot Capital Partners Invests $1.5 Million in Cyber-Security Company Light Cyber Benzinga (press release) Glilot Capital Partners, an early-stage fund focused on Israeli-based software companies, today announced that it has signed a definitive agreement to invest $1.5 million in Light Cyber, a developer of innovative solutions for identifying, preventing, ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
NCC outstripping expectations Stock Market Wire StockMarketWire.com - Cyber security specialist NCC (LON:NCC)said group profit before tax for the current financial year to 31 May 2012 to be between £21.0m and £21.5m, well ahead of market consensus of £19.6m. Revenue achieved is over 27% ahead of ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cyber Center Joins Data Security Effort Inside INdiana Business (press release) Cyber security researchers at Purdue University, the universities of Texas at San Antonio and Texas at Dallas are looking to apply those same principles to data. The three universities have been awarded a five-year, $3 million grant from the National ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Limited company IT security investment Paystream Accounting Limited company IT contractors could see a sharp rise in work as spending on cyber security deals is forecast to grow at ten per cent every year during the next three to five years. PwC says spending in this market will hit £3 billion in the UK alone ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Business continuity briefs: Continuity Central (press release) ENISA, the EU information security agency, has launched a report on proactive detection of cyber security incidents to make 'digital fire-brigades' more effective. The report identifies 16 shortcomings in detection of network security incidents and ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Information Security Critical With Increased Dependence on Virtual Technology PR Newswire (press release) The keynote speech titled 'Cyber Security and Cyber Threats in a Changing World' will be presented by General (Retired) Michael Hayden, former Director of the Central Intelligence Agency (CIA) and Deputy Director of the National Security Agency (NSA). ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Information Security Forum predicts 'perfect storm' with 2012 security challenges Response Source (press release) You could argue that we are heading towards a 'perfect storm', where a combination of threats relating to cloud, consumerisation, cyber security and more, will come together at the same time.” The increasing consumerisation of IT in 2012 will create ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
DHC: EHR Data Target for Identity Thieves MedPage Today By Cole Petrochko, Associate Staff Writer, MedPage Today NEW YORK -- Medical identity theft has become one of the most lucrative forms of identity theft, according to a panel of cybersecurityspecialists. Stolen patient data -- including electronic ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Surveillance Technology Takes a New Twist, Morphs Again The New American appointed to the Cybersecurity Task Force under the Committee on Financial Services, FinFisher “provide[s] an array of tools and training to let government agents capture everything from your phone and computer, and even control it remotely without ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Three gain Cyber Foundations honors Providence Business News 18 in tests that challenged their skills in networking, operating systems and system administration, the most important foundational skills of effective cyber security, according to a release from US Rep. James R. Langevin, D-Warwick, who founded the ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Splunk Opens Bethesda, Md. Office to Better Serve Federal Government Customers MarketWatch (press release) Next month, Splunk will open the Splunk Center of Excellence at the Bethesda office, a hands-on cybersecurity and analytics lab that will also feature a training center. The Splunk Center of Excellence will serve as the foundation for Splunk's federal ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Upcoming hearings Lexology (registration) On December 6, The House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies will discuss possible cybersecurity reform measures. The Senate Energy and Natural Resources Committee will hold a ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
9 Cybersecurity Threat Predictions for 2012 Security vendor Imperva predicts what to look out for next year. Government Technology News | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lt. General Harry Raduege: Three Top 2012 Cybersecurity “Game ... By Brynn Koeppen This assumption is a key realization that will shape the future of cybersecurity in 2012. There will be increased recognition that managing security is about managing risk. Each month, government agencies face an estimated 1.8 billion ... News & Insight for the DC Area Executive | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
International Cooperation, Public-Private Partnerships Highlighted ... By jim Three key themes emerged from a Cybersecurity Insider briefing on global cybersecurity hosted by Government Executive: 1. There is the need for enhanced international cooperation on cyberdefense including an expanded role for NATO. 2. ... FISMA Focus | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Charlie Miller now working with DoD for Cyber Security ~ The ... By noreply@blogger.com (THN Reporter) Charlie Miller now working with DoD for Cyber Security. Charlie Miller is a former hacker who has become an information security consultant now working with Department of Defense (DoD) for helping out with cyber security. He was invited to ... The Hacker News | Hacking News... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Federal IT executives convene to discuss budget cuts affecting cyber ... By PR NewsChannel Research conducted by GTRA determined that insufficient funding and being asked to 'do more with less' was the number one issue among IT executives, with specific concern on how this trend would impact cyber security. “There is plenty of ... PR NewsChannel | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Simplify Cyber Security Implementation | IT Governance Blog on IT ... By James Warren Effective cyber security depends on co-ordinated & integrated preparations for responding to, and recovering from, a range of possible cyber attacks. Cyber security standards enable you to mitigate these risks and implementation is simplified ... IT Governance Blog on IT governance,... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cybersecurity Predictions for 2012 « Your Daily Scoop By Tom Goldsmith Cybersecurity Predictions for 2012. By Tom Goldsmith, on December 8th, 2011. It's the time of year when the predictions start to flow, so not surprising that Cenzic, a web site security firm, has come up with a few prognostications for ... Your Daily Scoop | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Former Hacker Charlie Miller, Now Working with DoD on Cyber ... By Rj Former Hacker Charlie Miller, Now Working with DoD on Cyber Security. Posted by Rj ⋅ December 7, 2011 ⋅ Leave a Comment. Share this: Like this: Like. Be the first to like this post. « Today marks one year of the extralegal US banking ... The Daily Attack | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
What's In A Name? Homeland Security Develops Domain Name System Security Extensions ... By bobgourley DHS's role in this effort is STs Domain Name System Security Extensions (DNSSEC) project, which received the National Cybersecurity Innovation Award at the Sans Institute's Second Annual NationalCybersecurity Innovation Conference for ... Bob Gourley | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Raytheon acquires cybersecurity vendor Pikewerks Defense and aerospace systems vendor Raytheon has acquired cybersecurity vendor Pikewerks in an effort to add to Raytheon's capabilities to defend against ... www.networkworld.com/.../120511-raytheon-acquires-cybers... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
GAO: Agencies struggle to define cybersecurity workforce ... Several large departments have failed to close cybersecurity workforce gaps that could ... filling empty jobs in the department's National Cyber Security Division. ... www.federalnewsradio.com/?nid=440&sid=2650868 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
OSTP Announces New Cybersecurity R&D Plan | threatpost The Office of Science and Technology Policy (OSTP) released a new report yesterday that details plans to complement the nation's existing cybersecurity policy, ... threatpost.com/.../ostp-announces-new-cybersecurity-rd-plan-...
|