Cybersecurity To Ease Contractor Budget Cuts

Focus on Cybersecurity May Ease Contractor Budget Cuts
Washington Post
9 (Bloomberg) -- The US military's plan to invest in cybersecurity and space-based capabilities may ease the potential budget blow for some defense contractors such as Northrop Grumman Corp. and Lockheed Martin Corp. The Defense Department intends to ...

Three Wire Systems' Virtual World Used for Federal Cybersecurity Training
MarketWatch (press release)
Falls Church, VA, Jan 10, 2012 (GlobeNewswire via COMTEX) -- The Federal Cybersecurity Training Event program has been offering training to federal cybersecurity professionals since 2010, but they kicked things up a notch this month by launching a ...

Cybersecurity Experts Forecast Industrial Attacks, Preparation for Cyberwar in ...
Signal Magazine
By Max Cacas, SIGNAL Online Exclusive With the new year only a few days old, one of the information technology industry's biggest security firms is out with its annual predictions of the topcybersecurity threats for 2012. David Marcus, director of ...

Who are the go-to cybersecurity help groups?
Network World
There are a ton of groups out there that offer cybersecurity help and guidance, the trick, it seems is finding the right one for your organization. The Government Accountability Office this week issued a report on just that notion saying: " Given the ...

Cyber Security Challenge winner appointed as security engineer
SC Magazine UK
The winner of the SAIC Cyber Security Challenge has been appointed as a security engineer by RandomStorm. As announced by SC Magazine last month, Channon Powell was first in the SAIC competition and made it through to the face-to-face stage this month, ...

SEC Push May Yield New Disclosures of Cyber Attacks on Companies
Bloomberg
Enlarge image Cybersecurity Push May Not Have Changed Sony Breach OutcomeCybersecurity Push May Not Have Changed Sony Breach Outcome The cost to businesses of exposing data such as Social Security and credit-card numbers climbed to an average of $7.2 ...

Bloomberg

Banks Unite to Battle Online Theft
Wall Street Journal
By SUZANNE KAPNER Rising cybersecurity threats are pushing big banks to do something that doesn't come naturally for these secrecy-steeped institutions: share information with one another. This month, security officials from Wall Street financial firms ...

Fordham Hosts ICCS Cyber Security Conference January 9-12, 2012
FireEngineering.com
Howard A. Schmidt, special assistant to the president and cybersecurity coordinator: keynote address; General Keith B. Alexander, commander, US Cyber Command, director, National Security Agency/Central Security Service, will deliver the special keynote ...

Washington Does the Security Watusi
TechNewsWorld
By Richard Adhikari Government agencies are enacting new regulations to temper theircybersecurity resilience, including a new DoE/DHS effort called the "Electric Sector CybersecurityRisk Management Maturity Project." However, "This initiative does ...

Boaz students learn about cyber security
Sand Mountain Reporter
CyberPatriot is a national high school cyber defense competition designed to give students hands on exposure to the foundations of cyber security. Its goal is to excite students about science, technology, engineering and mathematics. ...

Do you know your cyberthreats?
PC Advisor
Since a GAO report late last year showed reports of security incidents from federal agencies have increased more than 650% over the past five years, the need for a community of help on thecybersecurity front is needed. Inside the current report, ...

Obama defence plan details heightened global cyber danger
ComputerworldUK
Read more The US prioritisation of cyber security comes as Israel's deputy foreign minister compared a recent cyber-attack, in which credit card accounts were compromised, to a terrorist act. The US, in its strategy, said it was stepping up spending on ...

Authorities probe US-China commission email hack
Reuters
The bipartisan, 12-member panel holds periodic hearings each year on China-related topics such ascyber security, weapons proliferation, energy, international trade compliance, and information policy. The email breach, if confirmed, would be the latest ...

Cyber Attacks Impact Social Well-being, Economic Development - Ongkili
Bernama
Meanwhile, he said CyberSecurity Malaysia's received a total of 15218 cyber security incidents reported via its Cyber999 Help Centre from January to December last year. He added that the incidents mark an increase of 88 per cent compared with 2010. ...

EIT awards finalists: Trifense fights the unknown cyber-threats
ECNmag.com
The Berlin spin-out Trifense, named as an EIT Awards finalist, takes a new approach to providingcyber security - and starts to gain traction in the market. Protecting a company or organisation against known cyber-security threats is one thing; ...

Jan 18: House Oversight and Government Reform Committee Hearing on DNS ...
International IP and the Public Interest
Darrell Issa, Chairman of the House Committee on Oversight and Government Reform, has announced a January 18 hearing to “examine the potential impact of Domain Name Service (DNS) and search engine blocking on American cyber-security, jobs and the...

International IP and the Public Interest

MANDIANT and Good Harbor Consulting Announce Alliance
MarketWatch (press release)
Good Harbor's cyber risk practice develops strategic cybersecurity programs that mitigate organizational risk, providing threat awareness, risk and governance assessment, crisis management, investment diligence, and regulatory/policy counsel. ...

Langevin opposes SOPA; 'incompatible' with cybersecurity
WPRI-TV 12 (blog)
As predicted here on Nesi's Notes, Congressman Jim Langevin has come out against the Stop Online Piracy Act. “While I strongly support protecting our intellectual property, SOPA's methods are incompatible with efforts to maintain the security and ...

Click, Fill ... Hired
Fox Business
Thanks to cyber security concerns at most major American companies, especially the names I've mentioned on the FOX News Channel and FOX Business Network in the last nine months, the idea of printing and mailing or emailing your resume is going the way ...

New Year's Resolution #1: Revisit Your Online Security Plan
Power Retail
The development may lead organisations behind cyber security breaches to better understand, and therefore bypass, the company's widely used security software. The Internet security firm would not confirm the claim made by a group called the Lords of ...

1Machine Technology Confident Of High Sales For Its Internet Security Solution
Bernama
The launch was officiated by CyberSecurity Malaysia Chairman Tan Sri Mohd Azumi Mohamed who represented Science Technology and Innovation Minister Datuk Seri Dr Maximus Ongkili. It is the first syariah-compliant security software, Abbyamir said, ...

The battle for Internet security
Military & Aerospace Electronics (blog)
Having attacked Mastercard and many other high-profile companies as a response to government action against Wikileaks and Julian Assange, Anonymous and cyber security became a hot topic in the recent years. Since then, several groups have emerged to ...

'Anonymous' hacktivists expose the intelligence gap
The Guardian
On this side of the Atlantic a recent government report on what it insists on calling "cyber" security, names hacktivism explicitly as a threat to national security. Yet nowhere is it made clear in the objectives of that report what the Ministry of ...

The Guardian

Apple, RIM and Nokia Allegedly Helping India Spy On United States
The Inquisitr
While the company's have not reacted to the claim it was also confirmed by cybersecurityresearcher Christopher Soghoian. While the leaked information was likely used for a variety of reasons one such example surfaced in which the Indian government ...

Cloud security breach inevitable as businesses underestimate security due ...
ComputerWeekly.com (blog)
In its 2012 Cyber Security Forecast, breach investigation firm Kroll says this is not happening and it believes cloud security will be more common this year. It said: "As cloud services gain in popularity, related breach incidents will flourish. ...

More Patient Data Risks, Lawsuits Predicted In 2012
InformationWeek
Christine Marciano, president of Cyber Data Risk Managers LLC, said she foresees healthcare organizations increasingly signing up for cyber security and data breach insurance policies to protect themselves and their patients. ...

Obama's Defense Strategy May Benefit Northrop, Huntington
BusinessWeek
The strategy's emphasis on cybersecurity may benefit companies that can help conduct attacks on adversaries' computer networks as well as shield US systems, Rodney Joffe, a senior vice president for NeuStar Inc., a Sterling, Virginia-based ...

FedRAMP includes 168 security controls
FederalNewsRadio.com
GSA and the departments of Defense and Homeland Security based these controls on the National Institute of Standards and Technology cybersecurity guidance, called special publication 800-53, Revision 3, for the Federal Information Security Management ...

Wall Street banks/Cyber security
Financial News
Please complete all fields in the form to login. Username and password fields are case sensitive If you have forgotten your username or password please use the forgotten your username/password link below. Automatic Login, by ticking the box you are ...

India This Evening: Israel Backs India's Bid for Permanent UNSC Membership
Wall Street Journal (blog)
... US authorities are investigating allegations that an Indian government spy unit hacked into emails of an official US commission that monitors economic and security relations between the United States and China, including cyber-security issues. ...

Rackspace CEO Slated to Testify at Upcoming SOPA Hearings
TalkinCloud (blog)
[The] Full Committee will hold a hearing on January 18 to examine the potential impact of Domain Name Service (DNS) and search engine blocking on American cyber-security, jobs and the Internet community. In light of policy proposals affecting the way ...

Israel Likens Credit Card Breach to Terrorist Act
eWeek
The United Kingdom also discussed improving its military's defense capabilities without actually committing to use military force in its Cyber-Security Strategy released in November. While 0xOmar claimed to have disclosed information belonging to about ...

Anti-spam plan lacks teeth: Prof
CANOE
His work has him investigating problems with cyber security, counter-terrorism, financial fraud and some law enforcement. And from where he stands, the anti-spam centre the federal government is set to launch simply doesn't make sense. ...

CANOE

Grant Street Group to oversee state tax credit auction
The Star Democrat
... creating the largest venture capital investment in the state's history with the potential to generate thousands of jobs in innovation economy sectors, such as life sciences and biotechnology, cyber security/IT, and clean/green tech. ...

DoD Strategy 2012: Cybersecurity is a Front Page Story!
By Randy Sabett
On Thursday, January 5th, President Obama unveiled the highlights of the U.S. defense strategy in an unprecedented appearance at the Pentagon briefing room. Cyber is a priority.
Law Across the Wire and Into the Cloud

Cyber Security for Chemical Industry | Events | PenTest Magazine
By Maciej Kozuszek
The recent spate of cyber attacks and next generation malwares has highlighted one thing to CIOs and CISOs in this space − cyber security is a priority | Cyber Security for Chemical Industry | The only magazine devoted exclusively to penetration testing. ... electronic threats - Understand the growing convergence between safety and security systems - Create a culture for security through on-going awareness campaigns that will protect your business. www.cybersecurity- chemicals.com ...
PenTest Magazine

SecuriTeam Blogs » 2nd Annual Cyber Security China 2012
By Aviram
The 'cyber security china 2012′ is organized with ISC2, which is typically a good indicator for interesting speakers and content (at least, that's been my past experience in other countries). The description shows that the Chinese are worried ...
SecuriTeam Blogs

s Defense Strategy Emphasizes Asia, Cybersecurity - PearPad
President Barack Obama presented a revamped U.S. military strategy for an era of budget cuts that pledges to emphasize Asia and space and cyber capabilities.
PearPad Content Shaker

House Committe Chariman Issa Calls For Hearing On DNS ...
By Michael H. Berkens
The Committee will hear testimony from top cyber-security experts and technology job creators. “An open Internet is crucial to American job creation, government ... The witness list includes strong opponents of SOPA and will lay out a powerful case that it will be ineffective at stemming piracy while discouraging Internet investment and innovation,undermining cybersecurity and promoting Internet censorship. Among the witnesses, Stewart Baker is former General Counsel to the ...
The Domains

NewsDaily: Authorities probe U.S.-China commission email hack
By Mark Hosenball
U.S. authorities are investigating allegations that an Indian government spy unit hacked into emails of an official U.S. commission that monitors economic and security relations between the United States and China, including cyber-security ...
NewsDaily: Top Headlines

Top Ten Cybersecurity Stories of 2011 - Cybersecurity Report
The year 2011 proved to be a busy one on the cybersecurity front, with significant attention being paid to attacks, breaches and general security issues....
cybersecurityreport.nextgov.com/.../top_ten_cybersecurity_sto...

Co-Chair Of Congressional Cybersecurity Caucus Says SOPA ...
The latest is a big one: the co-chair of the Congressional Cybersecurity Caucus, Rep. Jim Langevin, has come out against SOPA, stating his fears that the bill ...
www.techdirt.com/.../co-chair-congressional-cybersecurity-cau...

UMD, Lunarline partner on cybersecurity | Homeland Security News ...
The University of Maryland Cybersecurity Center will partner with Lunarline Inc. on cybersecurityeducation, research, and technology development ...
www.homelandsecuritynewswire.com/dr20120109-umd-lunar...

Government contractors now required to have cybersecurity plans ...
Under the new rule, contractors must submit cybersecurity plans within thirty days of winning a contract. Additionally contractors must also submit written proof ...
homelandsecuritynewswire.net/srinfrastructure20120109-gove...

Professor's Signcryption Technology Tightens Cyber Security
He has published more than 200 scholarly articles and books on security and holds several patents in cyber security. His most recent publication “Practical ...
newswise.com/.../unc-charlotte-professor-s-signcryption-techn...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com