Fast Company
As currently written, the bill merely defines “critical Internet infrastructure” as anything “whose disruption from a cyber attack would cause mass death, evacuation, or major damage to the economy, national security, or daily life.
Fast Company
White House, NSA weigh cybersecurity, personal privacy
Washington Post
The debate, which is surfacing as Congress considers landmark cyber-legislation, turns on what means are necessary and appropriate to protect vital private-sector systems from attack by China, Russia or other potential adversaries.
Cyber Legislation Will Cost Businesses and Hurt Economy
Forbes
Intended to help protect the nation against a major cyber attack by improving the security and resiliency of the computer systems of critical infrastructure companies, the Cybersecurity Act of 2012 (S. 2105) actually would put a federal agent inside ...
Cyber threats a game changer for the FBI
Computerworld
By Wayne Rash CSO - You know by now that cyber attacks are a growing threat to US government data facilities, critical infrastructure and American businesses. Thursday at RSA Conference 2012, FBI Director Robert Mueller will explain how the threat has ...
Invincea Addresses Evolving Spear Phishing Threat for Cyber Attacks With ...
MarketWatch (press release)
FAIRFAX, VA and SAN FRANCISCO, CA, Feb 28, 2012 (MARKETWIRE via COMTEX) -- Invincea, Inc., an innovator in advanced malware threat detection, end-user threat protection, and pre-breach forensic analysis, announced today at the RSA 2012 Security ...
Narus Cyber Survey: Situational Awareness Essential to Protect Critical ...
MarketWatch (press release)
SAN FRANCISCO, CA and SUNNYVALE, CA, Feb 28, 2012 (MARKETWIRE via COMTEX) -- RSA CONFERENCE -- Narus, Inc., the leader in real-time network traffic intelligence and analytics, today announced the results of its annual cyber security survey.
RSA Conference 2012: Cyber threats a game changer for the FBI
CSO
The rising tide of cyber threats has caused the FBI to change how it operates, FBI Director Robert Mueller will tell RSA Conference attendees Thursday. By Wayne Rash SAN FRANCISCO -- You know by now that cyber attacks are a growing threat to US ...
Cyber security expert finds new flaw in smartphones
SecurityInfoWatch
29 at the RSA conference in San Francisco, an annual cyber security gathering. The Shady Ratattack he disclosed last year targeted 72 government and corporate entities for as long as five years, siphoning off unknown volumes of confidential material ...
Anonymous, joining Wikileaks, hacks into the big time
GlobalPost (blog)
The US Senate too has taken notice and is debating passage of a bill known as the Cyber Security Act, which was introduced by Sen. Joe Lieberaman and aims to protect US infrastructure — like the power grid — against a cyber attack.
Cyber Pro Shortage Extends to Private Sector
Nextgov
For example, 79 percent of hiring managers globally said it was somewhat or very difficult to find qualified cybersecurity professionals, while 83 percent of federal hiring managers said cyberhiring was somewhat or very difficult. At the same time, ...
Cyber-security startup to flash major Android soft spots at RSA
Register
By Anna Leach • Get more from this author Three big-hitters in the world of cyber security have launched a firm that intends to unmask hackers and their motives, and they've scooped up $26m to get it started. As one of its first acts, CrowdStrike plans ...
Report: NATO needs more cyber capabilities
Nextgov
The Wall Street Journal and Washington Post reported on Monday that the National SecurityAgency has pushed for greater cybersecurity authority but has been rebuffed by the White House over privacy concerns. In 2002, NATO started a cyberdefense program ...
VP Binay pushes public-private partnership vs cybercrime
GMA News
Vice President Jejomar Binay on Monday pushed for a public-private partnership (PPP) approach to fight cyber-attacks and promote cyber-security, especially in the financial services sector. Speaking at a forum on cybersecurity, Binay said government ...
Treadstone 71 Announces Certified Cyber Intel and CounterIntel Analyst Boot Camps
Send2Press Newswire (press release)
The Cyber Intelligence Analyst and the Cyber Counterintelligence (CI) Analyst Certifications focus upon real world, practical activities coupled with theory. The certifications enhance the overall cybersecurity posture of the United States by ...
Send2Press Newswire (press release)
KEYW and Sensage Join Forces to Create Mission-Grade Cyber Intelligence Service
MarketWatch (press release)
HANOVER, Md., Feb 27, 2012 (GlobeNewswire via COMTEX) -- KEYW and Sensage, two leaders in security intelligence, today announced a strategic technology alliance to deliver "mission-grade" cyber intelligence services to commercial enterprises and ...
Cyber Warfare: The War Of Words
Science 2.0
Yet those ailments, unlike past examples of cyber "war," actually do kill people." No matter how many times I read that paragraph I still can't figure out what he's trying to say. I find the idea that only physical violence represents an act of war to ...
US SHOULD NOT FOLLOW CHINA'S EXAMPLE IN MERGING CYBER AND ELECTRONICWARFARE ...
Military & Aerospace Electronics
On November 14, Defense News ran an interesting story by Asia correspondent Wendell Minnick about how the General Staff of China's People's Liberation Army (PLA) manages cyber warfareactivities. Minnick quoted Australian security expert Desmond Ball ...
Guidance Software And FireEye Ally To Eliminate Advanced Malware
MarketWatch (press release)
"Determined hackers, hacktivists and cyber criminals have learned to evade traditional signature and policy-based approaches and the result is that the risk of data loss is higher than ever," said Alex Andrianopoulos, Guidance Software vice president ...
Sony Introduces Versatile New Lineup of Cyber-shot Cameras
Sacramento Bee
27, 2012 /PRNewswire/ -- With the ability to deliver impressive, high-resolution images while underwater, outside or inside, during both day and night, Sony's slim new line of Cyber-shots represent the ultimate in versatility for the compact camera ...
West Coast Labs and Spirent Collaborate to Define Cyber Security Test Methodology
MarketWatch (press release)
The increase in the number of cyber-attacks highlights the devastating effects they can have on revenue due to stolen assets, damage control, lost productivity and reduced brand confidence. With the migration to cloud computing, security becomes even ...
Senate considers Cybersecurity Act of 2012 (with related video)
Urgent Communications
has been pressing his colleagues to approve the Cybersecurity Act of 2012, a bill that would give the DHS regulatory authority over companies with computer systems crucial to the nation's economic and physical security. “The threat posed by cyber ...
Cyber Attacks: Not If or When, But Now
GovInfoSecurity.com
Credit Eligible No one - not even a security vendor - is immune to cyberattacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza. In an interview in advance ...
GovInfoSecurity.com
Get Closer to The Action With New High-Zoom Sony Cyber-shot Cameras
Sacramento Bee
27, 2012 /PRNewswire/ -- Sony's new "H-Series" high-zoom Cyber-shot cameras make it easy to capture crisp, beautiful photos and HD videos from a variety of distances. Ideal for travel photography or simply capturing everyday content, ...
DARPA, MIT Research A Self-Healing Cloud
InformationWeek
Researchers aim to develop a cloud computing environment that could immediately recognize and fend off a cyber attack, much like the human body fights a virus. By Elizabeth Montalbano InformationWeek The Department of Defense (DoD) is funding research ...
An ISO27001-compliant ISMS helps combat cybercrime
EIN News (press release)
/EINPresswire.com/ IT Governance Ltd, the global leader in ISO27001 and cybersecurityinformation, books and tools, warns that cyber attacks could be the largest threat to businesses this year. It is a mandatory requirement for UK public sector ...
A Good Solid Model For Cyber Security | SocInfo2011.org
By mitchell
The main discrepancies between national, corporate and data cyber security then lie.in the condition of network security plus attack prevention applications applied. This is why it's fundamental that Nigeria builds its capability since the future wars could be fought differently. But if we don't have a plan, this is time to develop a good cyber security plus warfare roadmap that may ensure that all of our national prosperity is definitely secured. A quantity of the traits as well as strength threats ...
SocInfo2011.org
ACUS Event on NATO's Role in Cyber Security « Marvin Ammori
By Luke Pelican
Participants included IBM's NATO and European Defence Leader Leendert Van Bochoven, IBM's Vice President Security Counsel & Chief Privacy Officer Harriet P. Pearson, and the Director of the Atlantic Council's Cyber Statecraft Initiative, Jason ... Bochoven provided a brief introduction in which he noted that cybersecurity is one of NATO's top priorities, and that as member states continue to connect information systems to industrial systems and other platforms, we must be able to ...
Marvin Ammori
Join me for the IRMI Cyber & Privacy Risk Conference. « Corporate ...
By Scott Godes
IRMI Cyber & Privacy Risk Conference. Mark your calendar to join us in Baltimore, MD on May 16-17, 2012. Noted cybersecurity, homeland and national security expert Richard A. Clarke will deliver the keynote address. Discussing the last ...
Corporate Insurance Blog
By Scott Godes
IRMI Cyber & Privacy Risk Conference. Mark your calendar to join us in Baltimore, MD on May 16-17, 2012. Noted cybersecurity, homeland and national security expert Richard A. Clarke will deliver the keynote address. Discussing the last ...
Corporate Insurance Blog
Anonymous, joining Wikileaks, hacks into the big time | iPolitics
By GlobalPost
The U.S. Senate too has taken notice and is debating passage of a bill known as the Cyber Security Act, which was introduced by Sen. Joe Lieberaman and aims to protect U.S. infrastructure — like the power grid — against a cyber attack.
iPolitics
U.S. should not follow China to develop Cyber and Electronic Warfare
By admin
Minnick quoted Australian security expert Desmond Ball as speculating that the General Staff may have merged its offensive cyber and electronic warfare activities into an "integrated network electronic warfare" directorate within the General Staff's Fourth Department. If this sounds too arcane to matter, guess again: the way major military powers organize their network defense, exploitation and attack efforts could decide the outcome of the next big global conflict. Let's assume for the ...
China Military Power Mashup
Shadow Warrior: san jose merc news: how hacker group ...
By nizhal yoddha
The Times article detailed a cyber-attack by Anonymous, which has lashed out with attacks on a number of companies and government agencies over the past year, on the Vatican web site last August. The article, drawing upon reports from Redwood City online security company Imperva, describes Operation Pharisee, an unsuccessful denial-of-service attack organized in Latin America intended to protest the Catholic Church's ongoing child sexual abuse scandal. The Imperva report ...
Shadow Warrior
Activist Post: Official List Of Words Feds Monitor On Social ...
By Activist
Cyber security. Botnet DDOS (dedicated denial of service) Denial of service. Malware Virus Trojan Keylogger Cyber Command, 2600. Spammer Phishing Rootkit Phreaking Cain and abel. Brute forcing. Mysql injection. Cyber attack. Cyber ...
Activist Post
A self-healing cloud | Machines Like Us
By NLN
Researchers aim to develop a cloud computing environment that could immediately recognize and fend off a cyber attack, much like the human body fights a virus. The Department of Defense (DoD) is funding research to create a cloud ...
Top stories
Kaspersky Tablet Security Adds Anti-Theft Protection for Android ...
Cybercriminals have quickly adapted to this change in consumer computing, and are rapidly developing cyber-attacks for these favored devices, tweaking their attack methods to target tablet users. In addition, tablets are made to be small and ...
Virtual-Strategy Magazine - Your...
House looks at cybersecurity of electrical grid | Cyber Warzone
The Senate is preparing to vote on a cybersecurity bill that would give the Homeland SecurityDepartment regulatory authority over companies with computer ...
www.cyberwarzone.com/.../house-looks-cybersecurity-electric...
Government Warns of Cyber Attack to U.S. Power Grid - Fox ...
Cyber security expert Robert Siciliano on government efforts to protect the U.S. power grid from potential cyber attacks. You must have JavaScript enabled to ...
video.foxbusiness.com/.../government-warns-of-cyber-attack-t...
Senators sharply divided over bill to regulate cybersecurity ...
Don't miss the latest federal reports on cyber security threats. Find the latest news at FederalTimes.com.
www.federaltimes.com/article/20120217/IT01/202170301/
Cybersecurity Act of 2012 - Cybersecurity Collides with Risk
Cybersecurity Act of 2012 - Cybersecurity Collides with Risk This is just a chance to create some new regulatory-agency office, hire a bunch of new auditors, ...
infosecisland.com/.../20400-Cybersecurity-Act-of-2012-Cyber...
China Cyber Attack Threat « China Cyber Warfare Blog
Two recent NPR stories highlighted the continuing potential for cyber attacks. One focused on the threat that China poses and the other story on what we should ...
chinacyberwarfare.wordpress.com/.../china-cyber-attack-threat...
Michael Chertoff, Mike McConnell Discuss Cybersecurity Bill | C-SPAN
The Cybersecurity Act of 2012 is bipartisan legislation that would give the Homeland SecurityDepartment power to identify vulnerabilities in critical infrastructure ...
www.c-span.org/Events/Michael-Chertoff.../10737428454/
Cybersecurity and U.S.-China Relations - Brookings Institution
Kenneth Lieberthal and Peter Singer say the U.S.-China relationship is perhaps the most significant to the future of world politics. Lieberthal and Singer argue ...
www.brookings.edu/.../0223_cybersecurity_china_us_singer_l...
US in new cybersecurity push | Bangkok Post: breakingnews
US senators, warning of potentially catastrophic cyberattacks, introduced a bill Tuesday aimed at protecting critical infrastructure such as power, water and ...
www.bangkokpost.com/.../us-senate-in-new-cybersecurity-pus...
Greek teen arrested over ministry cyber attack - Yahoo! News
From Yahoo! News: Greek police said Monday they had arrested an 18-year-old suspected of hacking into the justice ministry's website earlier this month, ...
news.yahoo.com/greek-teen-arrested-over-ministry-cyber-atta...
Cybersecurity Act of 2012 (Proposed) - Council on Foreign Relations
The Cybersecurity Act of 2012 (S. 2105) was introduced by Senator Joseph Lieberman in the U.S. Senate on February 14, 2012. The summary states, " Directs ...
www.cfr.org/cybersecurity/cybersecurity-act-2012.../p27479
Washington Post (blog)
But interviews and documents make clear that agency officials felt the scaling back of the authority to monitor for cyber threats and to push out countermeasures to industry was of great concern. It's unclear what kind countermeasures the NSA would ...
Department of Homeland Security's List of Watched Words on Social ...
By thegift73
The DHS monitor people's social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI). I have copied the search terms for Cyber Security below. Cyber Security. Cyber security; Botnet; DDoS (dedicated denial of service) ...
TechFleece