Privacy, data theft top cyber-security issues in 2012

Privacy, data theft top cyber-security issues in 2012
Economic Times
BANGALORE: Privacy and data theft will be the top security issues that organisations need to focus on in the new year, according to PandaLabs, the anti-malware laboratory of cloud security firm Panda Security. Cyber-espionage and social networking ...

Cyber Security Trends and Challenges for 2012 - Features - News ...
The severity, volume, and even the sophistication of cyber attacks is increasing, with very expensive and sometimes devastating results. Millions of records are ...
www.eweek.com/.../Cyber-Security-Trends-and-Challenges-fo...

2011: The year of domestic cyber threat
Aljazeera.com
While some in the US government attempted to link industrial control systems cyber security and radical Islamic fundamentalist terrorism soon after the 9/11 attacks, the probability of a major attack of this type by al-Qaeda was greatly discounted. ...

Aljazeera.com

Happy New Year and thanks to ZDNet's readers
ZDNet (blog)
I also had the opportunity to give a whole boatload of webcasts for CBS Interactive, on topics ranging from cybersecurity to cloud computing to virtualization. As I've been thinking about this past year, I realized I owed my general sense of well-being ...

ZDNet (blog)

Security provider is outgrowing its offices
Detroit Free Press
At a small network operations center in Commerce Township, employees at Nuspire Networks battle viruses, worms, spyware and other cyber security threats, 24 hours a day, seven days a week. The network security service provider has been steadily growing ...

Studies Highlight Smartphone, Tablet Security Woes
RedOrbit
On Thursday, eWeek writer Fahmida Y. Rashid reported on a similar study, compiled by the National Cyber-Security Alliance and security software provider McAfee. That study revealed that 70% of all smartphone users believed that their devices were safe...

RedOrbit

Goodbye party
Boston.com
To that list of concerns he added “non-state actors who suddenly play a much greater role in international affairs through cyber power'' - protesters linked and energized by Twitter and Facebook, and hackers whose full threat to cyber security remains ...

A winding cybersecurity road - IT Everything, the healthcare IT blog ...
A winding cybersecurity road - IT Everything, the healthcare IT blog by Modern Healthcare's Joe Conn.
www.modernhealthcare.com/article/20111228/.../312289965

Raytheon Adds Cyber Security Firm - Zacks.com
Raytheon Adds Cyber Security Firm-Raytheon Company has acquired privately held Henggeler Computer Consultants, Inc. that provides IT subcontracting ...
www.zacks.com/.../Raytheon%2BAdds%2BCyber%2BSecurity...

SEC issues guidance on cybersecurity disclosure
Whether they're in banking, retail or the defense industry, companies from a huge array of sectors face a diverse array of cybersecurity risks every day from ...
www.insidecounsel.com/.../sec-issues-guidance-on-cybersecuri...

Cyber Security Manifesto
Cyber Security, securing the virtual space and protecting networked assets, is of critical importance now that online goods and services permeate all levels of the ...
cybersecuritymanifesto.com/

Cybersecurity and Information Assurance | NCI
“Cybersecurity remains one of the principal IT market drivers, and NCI's full suite of integratedcybersecurity services places us at the forefront of protecting, ...
www.nciinc.com/.../cybersecurity-and-information-assurance/

Spending Bills Boost Federal Cybersecurity Funding in FY 2012
"The Cyber Innovation Center provides a model for the rest of the country on how to build a cyber security workforce of the future," she added. "By helping ...
www.hstoday.us/.../5372d228f0e9e3fcf254b36975517197.ht...

Top Ten Cybersecurity Stories of 2011
Nextgov
By Jessica Herrera-Flanigan 12/30/11 01:15 pm ET The year 2011 proved to be a busy one on thecybersecurity front, with significant attention being paid to attacks, breaches and general security issues. Hackers' exploits this year were not necessarily ...

U.S. Chamber of Commerce Hack Adds to Cybersecurity Concerns
Infoboom
The newly revealed network attack on the US Chamber of Commerce comes amid heightened concern over the state of national cybersecurity. Word of the chamber attack surfaced December 21 in The Wall Street Journal. The publication, citing sources familiar ...

Raytheon Buys Henggeler Computer Consultants for Key Intelligence Contracts
eWeek
Raytheon acquired Henggeler, based in Columbia, Md., to expand Raytheon's cyber-securityportfolio and better meet the needs of its customers in the intelligence community, the defense contractor said Dec. 29. The acquisition has been completed, ...

Check Point Initiated at Neutral
Zacks.com
Consequently, cyber-security is becoming a mission-critical, high-profile requirement. Check Point's rich experience in the security space and continuous delivery of mission-critical solutions has helped it to maintain and grow its market share. ...

Senator Ron Wyden (D-OR) on Online Piracy
C-SPAN
He says SOPA would damage the domain name system - the basic architecture of the internet- would be compromised, it would harm efforts at cybersecurity and it would lead to censorship. Senator Wyden and House Oversight and Government Reform Committee ...

71m smart utility metres in 2012
ITWeb (blog)
Cyber security and data privacy in the context of the smart grid, and Analytics and Big Data were also focus areas. The IDC says the Middle Eastern and African regions will continue to strive to increase their power supply focusing on energy ...

Get started 'On' the new year: Obama delays debt ceiling request, unemployment ...
Washington Post (blog)
Hacktivism and other cybersecurity threats are also predicted to take center stage in the coming year. The biggest stories of 2011: Small businesses owners faced a littany of challenges in 2011, but amidst a backdrop of economic uncertainty and ...

3 Big, Big Trends to Watch in 2012
Moneyshow.com
The biggest companies providing services like cybersecurity to government departments like the Department of Homeland Security, the Pentagon, and intelligence agencies are SAIC (SAIC), URS Corp, (URS) and CACI International (CACI). ...

Business data collection 'may face backlash from mobile users'
Ontrack Data Recovery
His comments follow those by Mark Dampster, associate at the Centre for Cyber Security, who claims data security needs to be at the heart of everything businesses and individuals do in 2012. Is your data asset getting out of sight? ...

SOPA threatens the future of a free, open internet
The Star-Ledger - NJ.com (blog)
Stifling creativity and innovation, as well as destroying jobs and jeopardizing cyber-security, would also be undesired results if these bills are enacted into law. The mainstream media have curiously and unfortunately not reported much on these bills....

The Star-Ledger - NJ.com (blog)

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com