8000 contractors said eligible for US cyber guard

8000 contractors said eligible for US cyber guard
Chicago Tribune
The Pentagon on Friday invited all of its eligible contractors to join the voluntary pact aimed at fighting what US officials have described as growing cyber threats that allegedly originate, above all, in Russia and China. The Defense Department will ...

McAfee, Intel working to protect energy utilities from cyber attacks
ZDNet (blog)
Besides promoting more awareness about cyber security and increasing attacks, some of the objectives for this platform include improving and speeding up response times to attacks, decreasing the changes of a malicious attack in the first place, ...

New classroom-based cyber-security courses aimed at assisting communities
TEEX News
Earlier this year, TEEX and UTSA jointly offered the courses to jurisdictions nationwide to help them prepare for the DHS-FEMA National Level Exercise 2012, which will involve acyber-security attack, said Natalie Granado, Cyber Security Training ...

Thwarted by security at enterprises, cyber criminals target SMBs
Network World
Verizon's security research director, Wade Baker, told London's The Inquirer that cybercriminals were mass producing their attack techniques and targeting small- and medium-size businesses (SMBs). Speaking from Verizon's Security Operations Center in ...

DoD ready to meet pent up demand for cyber threat sharing program
FederalNewsRadio.com
DoD capped the voluntary program at 36 companies that the Pentagon believed were ripe targets for foreign cyber intrusions. "The defense industrial base companies face a kind of unrelenting attack from sophisticated actors who are trying to steal ...

Agari Email TrustIndex Applies Big Data Insight to Reveal Online Travel ...
MarketWatch (press release)
A secure email channel is critical to achieving and sustaining viral adoption so it is not surprising that Social Media companies would be the leaders in taking on cyber criminals and finding new ways to secure their email channel.

Americans Rate Cyber-Security as Hot Issue in Presidential Election: Survey
eWeek
Cyber security is considered by many Americans to be a “very important” issue for this year's election candidates. In particular, a focus on defending utilities and transportation systems fromcyber-attacks is important, according to a survey by Unisys ...

Cyber Security Index Highlights Political Threats, Business Partner Risk
Threatpost (blog)
by Paul Roberts The first annual Index of Cyber Security finds that senior security officers are more concerned than at this time last year about the risk of cyber attack and other online risks, with concerns about ideologically-motivated hacktivists ...

McAfee Aims to Protect Critical Infrastructure from Increased Attacks
MarketWatch (press release)
This end-to-end security solution features remote management using Intel AMT to lower device support costs. "To adequately secure critical systems against cyber attacks, the right products and technologies must be integrated into the entire ...

Civil-liberties groups slam GOP Senate cyber bill
The Hill (blog)
The goal of both bills is to remove legal barriers that prevent companies from sharing information about cyber threats with the government. The Lieberman-Collins bill would also set mandatory cybersecurity standards for critical infrastructure, ...

McAfee and Intel team up for energy infrastructure protection
Computer Business Review
... creating what they call a "reference implementation," which essentially is a mock-up of a critical infrastructure environment with McAfee's security products installed and can offer a simulation of what happens during an unsuccessful cyber attack.

Over A Thousand Young Cyber Security Enthusiasts Registered and Competed in ...
PR Newswire (press release)
The top scoring participants will now be invited to one of USCC's Summer Cyber Camps where they will develop their skills under the tutelage of cyber security instructors, compete in a capture-the-flag exercise with other campers, and meet with ...

Cyber Team Preparing to Protect London Olympics from Cyber Attacks
Backup Technology
Maude stated, “The Beijing Olympics saw 12 million cyber security incidents during their Olympics. We have rightly been preparing for some time; a dedicated unit will help guard the London Olympics against cyber-attack. We are determined to have a safe ...

McAfee-Intel eye critical infrastructure protection
CSO (blog)
The "reference implementation" allows the audience to witness the system response of an unsuccessful cyber-attack thwarted by McAfee Embedded Control and the impact of a successful attack on an "improperly configured" system.

Apple is Asking Kaspersky for Security Advice
PCWorld (blog)
... security of Mac OS X. The security company has offered up the following statement from Nikolay Grebennikov: "As Mac OS X market share continues to increase, we expect cyber-criminals to continue to develop new types of malware and attack methods.

Next Round in Cybersecurity Battle: The Senate
American Civil Liberties Union News and Information (blog)
The Senate will likely take up its own cybersecurity bill, S. 2105, the Cyber Security Act of 2012 (CSA), in June. The CSA is over two hundred pages long and deals with many cyber issues that are civil liberties neutral.

McAfee and Intel offer protection to the world's national grids
SC Magazine UK
McAfee and its parent Intel have announced a solution to protect the world's energy utilities fromcyber attack. The companies have developed a blueprint for a comprehensive solution of multiple products that will create layers of security without ...

GovWin Recon: May 15: 8000 Contractors Eligible for DOD Cyber
govWin (blog)
8000 contractors said eligible for US cyber guard [Chicago Tribune/Reuters] – DOD deputy chief information officer Richard Hale estimates around 8000 defense contractors are eligible for thecybersecurity sharing initiative, though he expects the ...

Security firm claims OS X is 'really vulnerable' to malware
BGR
”As Mac OS X market share continues to increase, we expect cyber-criminals to continue to develop new types of malware and attack methods, ” the company's CTO Nikolai Grebennikov said. “In order to meet these new threats, Kaspersky Lab has been ...

Guarding against emerging spear-phishing threats
Government Security News
We're on the front lines, if you will, of a fight against emerging and persistent cyber threats. This year, IT security staff and contractors are increasingly on guard against the now pervasive tactic of "spear-phishing." In this type of targeted ...

US should get tough with China over cyberattacks, experts urge // 9:32 AM ET
Nextgov
“Come on, does anyone really believe that the [National Security Agency's] Cyber Command is not doing the same or worse to China?” another Insider asked. “Cyber war/defense is the next giant gravy train for the obese security-industrial complex, ...

DoD Taps Commercial Internet Providers to Help Protect Defense Industry Networks
National Defense Magazine (blog)
The Pentagon would like to see at least 1000 companies join the so-called “Defense Industrial Base Cyber Security/ Information Assurance” program, Hale said in a May 14 conference call with defense journalists and bloggers. In an extraordinary move, ...

Senator Joe Lieberman's Cybersecurity Bill Faces Uphill Battle
Game Politics
cybersecurity bill - a counterpart of sorts to the House's Cyber Intelligence Sharing and Protection Act (CISPA) - is running into plenty of opposition from Democrats in the Senate who say the bill does not do enough to protect the privacy of citizens.

Hello Skynet: Self-adapting computer network to defend itself against hackers
Computerworld (blog)
A business has to build its network so it can handle those peak times, perhaps for CyberMonday, such as in the parking lot example. "Creating a moving-target defense - computer networks that could defend against cyberattacks by automatically changing ...

Cost of a Cyberattack: $100000 Per Hour for Some Retailers [REPORT]
Mashable
According to Neustar, more than half of respondents said they rely on “firewalls, routers or switches” as their sole means of cyber defense, and less than 5% have a “purpose-built”cybersecurity solution. Swearingen recommends that small businesses ...

Kaspersky: Apple needs to face up to Mac threats
CNET
Still, Kaspersky said Apple is open to collaboration on security matters: As Mac OS X market share continues to increase, we expect cyber-criminals to continue to develop new types ofmalware and attack methods. In order to meet these new threats, ...

Interim DoD Regulation Expands Defense Industrial Base Pilot To Facilitate ...
JD Supra (press release)
DoD-Defense Industrial Base (DIB) Voluntary Cyber Security Information Assurance (CS/IA) Activities, 77 Fed. Reg. 27615 (May 11, 2012). The Interim Rule authorizes eligible companies to receive certain threat information in return for sharing ...

Kaspersky Wants To Work With Apple To Increase OS X Security
RedOrbit
In his second statement, Grebennikov said, “As Mac OS X market share continues to increase, we expect cyber-criminals to continue to develop new types ofmalware and attack methods. In order to meet these new threats, Kaspersky Lab has been conducting ...

RedOrbit

Android users are a "lucrative target" for cyber criminals
ComputerActive.co.uk
Users of Android tablets and smartphones are becoming an increasingly "lucrative target" for cyber criminals F-Secure has found. In its latest Mobile Threat report the security firm said that fraudsters are downloading malwaresuch as Trojans and ...

ComputerActive.co.uk

UK lawsuit could compel Facebook to reveal true identities of cyber-bullies ...
Digitaltrends.com
If successful, it would be the first of its type in the UK, and comes soon after the prosecution of a student for a racial attack on an MP via Twitter. Bains Cohen are using this to their advantage, saying the police take a more active approach to ...

An ambiguous FBI cyber alert raises more questions than it answers ...
By Aliya Sternstein
One cybersecurity researcher suggested the FBI omitted certain details that could more effectively protect computer users, but such information might unsettle U.S.-China diplomacy. ...“The day before the FBI's warning was issued, U.S. Defense Secretary Leon Panetta met his Chinese counterpart, Liang Guanglie, in Washington D.C., and told the world's press that the two countries must work together to avoid cyber war and emphasized the importance of the relationship between ...
Nextgov - All Content

Chemical Facility Security News: HR 4310 Reported in House
By PJCoyle
Interestingly the amended version of the bill included in that report contains two new sections referencing cybersecurity issues; none directly referencing control systems, but cybersecurity none-the-less. ... Cyber Warfare. While not directly related to control system security the addition of §941 to this bill may have certain long term consequences for the control system securitycommunity. This section revises the statement of authority for DOD to conduct operations in cyberspace that ...
Chemical Facility Security News

Latest Cyber Security Challenge is under way – bcs.org | Blackmere ...
By Blackmere
Latest Cyber Security Challenge is under way – bcs.org. Published May 15, 2012. Details reposted on behalf of the CyberSecurity Challenge UK. As you may be aware, the Challenge has launched a brand new competition at the end of April ...
Blackmere Consulting

Over A Thousand Young Cyber Security Enthusiasts Registered and ...
By WDM Group PR Network
The online competition, conducted in collaboration with the SANS Institute, featured a series of quiz questions based on analysis of a packet capture file which participants analyzed on their own machines, searched for signs of attack, and ... The top scoring participants will now be invited to one of USCC's Summer Cyber Camps where they will develop their skills under the tutelage of cyber security instructors, compete in a capture-the-flag exercise with other campers, and meet with ...
Press Releases

MITZI PERDUE: CYBER CRIMINALS CAN EXPLOIT POSTINGS ON ...
By Ruth King
As a New York-based cyber-security expert and CTO, he would find a number of causes for concern since he knows that women are particularly vulnerable to misuse of information used in social media. “Your Facebook/Twitter status and photos say a lot about you,” he says, adding, “A determined person may already ... That post could set you up for a robbery or even a physicalattack.” He goes on to say, “On top of that, the bad guy also knows it's your birthday, and if he's a determined ...
RUTHFULLY YOURS

Look Ma, I found security! Or, just Another Brick in the Wall | The ...
By John Burnham
Security Intelligence. With the growing threat of cyber attacks, sophisticated hackers, devastating viruses & worms and more, keeping your network secure requires superior intelligence. Q1 Blog leverages the experience of the industry's best minds and ... According to a UK news website, the CEO of a large, really large, hardware vendor just noticed that the world is being ravaged by terrorists, and warned that a ”cyber-attack of 9/11 scale” is likely to take place in the near future.
The SIEM, Log Management, and...

Superconductor: INTERPOL takes on cyber-crime
By Luther Martin
Innovation, research and digital security. Boosting cybersecurity and countering cybercrime;; A forensic laboratory to support digital crime investigations;; Research to test protocols, tools and services and to analyse trends of cyber-attacks; ...
Superconductor

Classified Personal Info Released to Pentagon from Major ...
By Shepard
Will the standard rhetoric of a hacker threat or cyber attack by terrorists gain the powers that be full control of your personal information? ... After a pilot program that involved 36 contractors and three of the biggest U.S. Internet providers, the Obama administration approved a rule letting the Pentagon enlist all contractors and Internet providers with security clearances in the information exchange, according to Eric Rosenbach, deputy assistant secretary of defense for cyberpolicy.

Cloud Security Benefits for SMBs in Singapore - Cloud Computing ...
By trusted-cloud
43% of SMBs said their business was more secure as a result of moving to the cloud; 50% said it was easier to integrate systems; 48% said they worried less about the threat of cyber-attack. In coming weeks, we'll continue to highlight data ...
Cloud Computing | Microsoft Trustwort...

Obama Approves News Cyber Security Pilot ... - Break The Matrix
By BreakTheMatrix
Tagged as: AT&T, CISPA, consumer, Cyber Security Pilot Program, Cybersecurity, facebook, Internet, internet privacy, national security, NSA, Obama, online privacy, phone company, PIPA, sopa, Surveillance, Verizon · Cancel reply. Leave a ...
BreakTheMatrix.com

Internet Wars: The Empire Strikes Back - Beehive Media
By Harris Bierhoff
While SOPA focused on defending intellectual property and CISPA focuses on enhancing cyber security, both bills pose threats to Americans' Constitutional rights in terms of user privacy. ...Attack of the Clones. While he must foresee his user- base vehemently opposing CISPA, he has hardly been one to care about the perpetual whining from users that accompanies Facebook application updates. But to the question of his potential shareholders, perhaps he anticipates the majority ...
Beehive Media

Cybersecurity: Top Secret System Compromised
The Ministry of Defence Main Building in London.Information became public last week about another successful cyber attack. While that has become.
gov.aol.com/.../cybersecurity-top-secret-system-compromised/

Cyber Attack on US Natural Gas Companies: A case of espionage ...
“A major cyber attack is currently underway aimed squarely at computer networks belonging to US natural gas pipeline companies.” Hard to say if more info will ...
trackingenergyattacks.com/cyber-attack-on-information-infras...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com