Americans want Defense -- not DHS -- to guard cyberspace ...
By By Bob Brewin
Claiming to have the backing of the American people, lawmakers argued the Defense Department -- not the Homeland Security Department -- should guard the... ... That means that Cyber Command must be ready, and Congress and the administration must find a way to ensure that it has the legal authorities it needs and at the same time ensure that the constitutional rights of Americans are protected." Thornberry, in a comment during the hearing, said this hands Congress a ...
Nextgov.com News Articles
Senators welcome DHS Cyber security budget, question grant changes
Government Security News
The leaders of the Senate Homeland Security committee warmed to proposed increases in funding for DHS's Cyber security efforts, but expressed concerns about its proposed securitygrant consolidations. At a Senate Homeland Security and Governmental ...
U.S. Military Readies Cyber 'Rules of Engagement'
InformationWeek
DOD soon will release rules instructing the military how and when to fight fire with fire in the event of a cyber attack. By J. Nicholas Hoover InformationWeek The Department of Defense could issue within one to two months cyber rules of engagement ...
Officials: Cyber Research Needs Innovation, Talent
Department of Defense
“Our approach to cybersecurity is dominated by a strategy that layers security onto a uniform architecture,” Gabriel explained. “This approach … is not convergent with a growing and evolving threat. That's the defensive picture.” In cyber offense ...
Budget cuts put cybersecurity at risk
Politico
Continue Reading Text Size - + reset Budget limitations have hamstrung the government's ability to compete with the private sector, which can offer cyberresearchers more pay and more opportunities for advancement. And competition is particularly ...
Politico
AT&T Urged by US to Step Up Cybersecurity on Home PCs
BusinessWeek
“Cyber attacks pose a very real threat” and companies are acting to fight them, Julius Genachowski, chairman of the Federal Communications Commission, said as he endorsed recommendations in a voluntary code of conduct formed by an advisory committee to ...
Sound cybersecurity can help US businesses retain their competitive edge
TopWireNews (press release)
/EINPresswire.com/ IT Governance Ltd, the global provider of cyber security management solutions, has expanded its range of cyber security products. These now include the ISO27001Cyber Security Toolkit (www.itgovernanceusa.com/product/2379.aspx) and ...
Cybersecurity Bill: Vital Need Or Just More Rules?
NPR
Joe Lieberman, I-Conn., Susan Collins, R-Maine, and others, would require owners and operators of critical infrastructure assets to notify the Department of Homeland Security of any and all cyber intrusions into their operating systems.
When Hackers Want Much More Than Money
InformationWeek
Since then, however, the number of losses traced to cyber criminals has increased, and in 2011, hacktivism came onto the scene in force. "We're all seeing in the media the Occupy movement, Anonymous. There's a big mentality shift where it used to be ...
Kaspersky warns of 'cyber weapons'
Irish Times
POLITICAL LEADERS in every country need to take urgent action to combat the imminent threat of cyber-war and cyber-terrorism, a leading international internet security expert has warned. Eugene Kaspersky believes countries like Ireland and the UK are ...
Banks Lose US$245 Million in Cyber Fraud
AllAfrica.com
Kioko said that a survey, conducted by Deloitte last year, indicates that banks in Kenya, Rwanda, Uganda, Tanzania and Zambia lose $245 million in cyber fraud. He was Tuesday speaking at a news briefing ahead of banking and cyber security workshop ...
7 simple steps for thwarting hactivists
InfoWorld
The Verizon 2012 Data Breach Investigations Report includes analysis from 855 cyber securitybreaches worldwide that involved 174 million compromised records. More than half -- 58 percent -- of all data that was compromised last year was the result of ...
Kratos Receives $5.7 Million Award for an Electronic Attack Platform
MarketWatch (press release)
Kratos' areas of expertise include Command, Control, Communications, Computing, Combat Systems, Intelligence, Surveillance and Reconnaissance (C5ISR), satellite communication systems, unmanned systems, cyber warfare, cyber security, ...
Tibetan Cyber Attack Warning Used as Malware Lure
eSecurity Planet
AlienVault researcher Jaime Blasco warns that hackers are using a recent report about cyberattacks on Tibetan activists to distribute malware. "Newly intercepted rogue emails that use spoofed headers to appear as originating from AlienVault warn ...
3 factors inhibit DOD cyber infrastructure defense
Defense Systems
“If it is an attack, the responsibility falls to the Defense Department” to respond, Gen. Keith Alexander, commander of the US Cyber Command, told the House Armed Services subcommittee on Emerging Threats and Capabilities on March 20.
Investing in cyber – and economic – security: Let's get to it
The Hill (blog)
This is important work and an opportunity to address the growing and maturing cyber threats we face as a country. Though there are differences of opinion on how we arrive, we all agree we need to get there. Several elements of the previously-proposed ...
DARPA's Acting Head: High Cyber Workforce Turnover Rate a Positive
ExecutiveGov
The Defense Advanced Research Projects Agency's acting chief has suggested that keepingcyber professionals for an extended period of time may not benefit either the agency or the professional, NextGov reports. Ken Gabriel, DARPA's acting director, ...
SC Congress Canada To Unveil the Realities of Today's Cyber Threat Landscape
PR Web (press release)
The event brings together the industry's top security luminaries to discuss actionable steps for winning the never-ending arms race against cyber criminals. In its third year, SC Congress Canada continues to deliver. Attending security professionals ...
BreakingPoint Actionable Security Intelligence Solutions Drive Record Revenue ...
MarketWatch (press release)
"Cyber attackers are winning, and our businesses and governments are losing -- losing sensitive data, financial assets, operational effectiveness and more," said Des Wilson, BreakingPoint CEO. "Traditional cyber security approaches, simply reacting to ...
Cyber Patriot competition preparing next generatio of cyber experts
FederalNewsRadio.com
... nation's capital this week to plug holes in computer security — and to win prizes. They're part of the Cyber Patriot competition. The goal of the competition is to inspire more students to pursue careers in cybersecurity and other critical areas.
Report: Criminals switching tactics to breach cyber defences
Computing
By Andrew Charlesworth Althought IT security professionals are winning the war against traditional security threats such as spam and application code exploits,cyber criminals are switching tactics to social network phishing, mobile exploits, ...
Computing
US boosts cyber defences to meet rising hacking threats
Oman Tribune
“I can assure you that ... we can back up the department's assertion that any actor threatening a crippling cyber attack against the United States would be taking a grave risk.” Alexander and other Pentagon cyber experts told lawmakers that since ...
Cyber dangers explored
Toledo Blade
BY CARL RYAN Sgt. Justin Music of the Sylvania Police Department speaks during a cyber parenting workshop at Sylvania Senior Center. THE BLADE/ANDY MORRISON Enlarge | Photo Reprints Cyberspace is a potentially dangerous place for children, ...
Toledo Blade
China claims it's the most attacked country
SC Magazine UK
Zhou Yonglin, an information security official from the Internet Society of China, told the People's Daily Online that "China has become the world's biggest victim of cyber attacks". Speaking at the Worldwide Cybersecurity Summit in London last year, ...
SC Magazine UK
The right to bear (electronic) arms
ITWeb
A few years ago, cyber warfare and cyber terrorism started popping up as topics at information security conferences. The speakers were greeted with much eye-rolling and suggestions that the notion was vastly over-exaggerated, possibly as an excuse to ...
ITWeb
GovSec Expo to Showcase Cutting-Edge Products for Homeland Security, First ...
MarketWatch (press release)
Neustar NeuSentry™ (Booth 2225) -- As the new layer in information security, NeuSentry offers the most comprehensive early warning system of cyber threats by identifying data breaches and network compromises that a customer's existing security tools ...
Activists 'commit more data breaches than cybercriminals'
The Guardian
Cybersecurity analysts said that they expect hacktivism to continue, though it may not be as severe. "It may be episodic, with peaks and valleys," said Andy Purdy, chief cyber security strategist for CSC, which helps companies and government agencies ...
The Guardian
IBM X-Force Report: 2011 Shows Progress Against Security Threats But Attackers ...
MarketWatch (press release)
As long as attackers profit from cyber crime, organizations should remain diligent in prioritizing and addressing their vulnerabilities." Thirty percent decline in the availability of exploit code - When security vulnerabilities are disclosed, ...
“In my opinion this is a very serious problem because while social ...
By editor
POLITICAL LEADERS in every country need to take urgent action to combat the imminent threat of cyber-war and cyber-terrorism, a leading international internet security expert has warned. Eugene Kaspersky believes countries like Ireland and ... “The worst-case scenario is if there was a cyber attack designed to strike our technology-permeated world, one that would attackcritical infrastructure, factories, transportation networks. “Everything is managed by computers today – it makes ...
TURKISH CENTRAL RESEARCH STRATEGY...
With Fears Over Cyber Attacks, Should Companies Invest In ...
By Joseph Souren
Cyber Attack. A Canalys report published in the last week indicates that the value of the EMEA (Europe, Middle East and Africa) network security market topped $674 million in Q4 2011, up 9.0% year-on-year and 12.8% over the previous ...
Business Computing World
Report on cyber threat used to attack Tibetan activists Call: 1-877 ...
By ameet.deka
cyber-attacks A recent report about hack threat to pro-Tibetan activists was used as a lure toattack Tibetan organizations. Researchers from security vendor AlienVault say that these attacks distribute Windows and Mac malware infections.
iYogi
Face to Face with Duqu malware | Security Affairs
By paganinip
the choose of control systems as target of the malware. the conception of the virus as an open project, a modular system for which it was designed a development platform used to assemble the deadly cyber weapons in relation to the final targets . Regarding the ... The attack module of DuQu, found together with the detected samples was a general purpose keylogger (enriched with some additional spying capabilities) able to perform a reconnaissance in any organization. However ...
Security Affairs
Sound cybersecurity can help U.S. businesses retain their ...
By Blackmere
Sound cybersecurity can help U.S. businesses retain their competitive edge – PR Inside. Published March 22, 2012. EINPresswire.com/ IT Governance Ltd, the global provider of cyber security management solutions, has expanded its range ...
Blackmere Consulting
U.S. Department of Defense preps cyber rules of engagement, plans ...
By Sean Buckley
The Pentagon left no room for argument last year when it declared cyber attacks a potential act of war. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," a military official reportedly remarked. Yikes.
Engadget
Dangerously Vague Cybersecurity Legislation Threatens Civil ...
By admin
Senator John McCain's SECURE IT Act (S. 2151) does not use the term “cybersecurity threat indicator” but uses virtually identical language to define “cyber threat information.” In all cases, the language of what constitutes the notion of a ... Such a broad definition implicates far more than what security experts would reasonably consider to be cybersecurity threat indicators — things like port scans, DDoS traffic, and the like. Indeed, merely using a proxy or anonymization service to let ...
Conservative Action Alerts
Strategic blindness: When aliens attack
By sam
Professors Sam and Sydney Liles: Cyber warfare, privacy, computer security, computer forensics, technology, software engineering, running, life in general, and more. front page · Terms of Use · Attribution · RSS. Selil header image 2 ...
Selil
Activists 'commit more data breaches than cybercriminals' | The Raw ...
By Charles Arthur, The Guardian
Cybersecurity analysts said that they expect hacktivism to continue, though it may not be as severe. “It may be episodic, with peaks and valleys,” said Andy Purdy, chief cyber securitystrategist for CSC, which helps companies and government ...
The Raw Story
Hacktivists have become big-time data thieves ... - Security Bistro
By Neil Roiter
News and analysis of the latest cyber attacks, security threats, network security, mobile security, data protection and much more. ... “We've become quite adept at recognizing that nested attack. More often than not we keep getting engaged in ...
Security Bistro
Cybersecurity and the FCC's CSRIC Recommendations | AT&T ...
By Bob Quinn
Today, the FCC's Communications Security, Reliability and Interoperability Council (CSRIC) issued their recommendations to the FCC on several issues related to cybersecurity including: DNSSEC implementation practices for ISPs; secure Border Gateway Protocol (BGP) deployment; and ... AT&T has a long history of working to address both physical and cyberthreats and has actively participated in the CSRIC process, including having representation on all three working groups.
AT&T Public Policy Blog
China again victim of cyber attacks | Security Affairs
Of course the same country is victims it self of cyber attacks, many expert are in fact convinced that despite the aggressive cyber offense, Chinese cyber defense ...
securityaffairs.co/.../china-still-a-victim-of-cyber-attacks.html
Senate debates DHS' role in regulating cybersecurity ...
Follow the news about current and upcoming federal government IT changes.
www.federaltimes.com/article/20120320/IT03/203200303/
More countries falling victim to cyber attack threat
Cyber space is increasingly mirroring the sentiment in the real world where threats are often hyped for political purposes and the real source of dang...
www.globaltimes.cn/.../More-countries-falling-victim-to-cyber...
BBC Blames Iran in Attack as Cyber War Rages Alex Jones ...
Kurt Nimmo Infowars.com. March 13, 2012. The BBC claims Iran engineered a sophisticatedcyber-attack on its Persian service. Director-general Mark ...
www.infowars.com/bbc-blames-iran-in-attack-as-cyber-war-ra...
Cybersecurity: Building Safer Computing Experiences in a ...
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely ...
blogs.technet.com/.../cybersecurity-building-safer-computing-...
Daily NK - High Risk of Election Cyber Attack
North Korea is now issuing a constant torrent of abuse in the general direction of South Korea. Nominally in response to a South Korean military unit in Incheon ...
www.dailynk.com/english/read.php?cataId=nk00400&num...
Follow @sobeqorg