msnbc.com
Wyndham's 2011 annual report said the "hospitality industry is under increasingattack by cyber-criminals in the U.S. and other jurisdictions in which we operate" and noted that it was involved in "claims relating to information security and data privacy.
msnbc.com
Senator calls for stricter guidelines requiring corporations to inform ...
Washington Post
Rockefeller's measure would direct the SEC's five commissioners to make clear when companies must disclose cyber breaches and spell out steps they are taking to protect their computer networks from electronic intrusions. The SEC recently challenged ...
New Approaches to Grid Defense
energybiz
Today, cybersecurity is the flash point for those of us concerned about the integrity and resilience of the grid. A successful cyber attack could disrupt our economy and nationalsecurity. The threat is serious enough that PJM Interconnection, like ...
Smartphones drive latest wave of cyber-bullying
Sydney Morning Herald
THE rise of smartphones has outpaced traditional wisdom on how parents should monitor teenagers' use of technology and created a powerful new venue for cyber-bullying, according to an Australian psychologist who has conducted the most detailed study ...
Sydney Morning Herald
The Sportsmanship of Cyber-warfare
CircleID
As a bit of a history buff I can't avoid a slight tingling of déjà vu every time I read some new story commenting upon the ethics, morality and legality of cyber-warfare/cyber-espionage/cyberwar/cyber-attack/cyber-whatever. All this ... Today, I think ...
Is Time Right for Military Cyber Branch?
GovInfoSecurity.com (blog)
Rethinking the idea of establishing a fourth military branch in the United States to focus on cyber warfare. ... The cyber command, not coincidentally, is headed by the director of the National Security Agency, Army Gen. Keith Alexander, and collocated ...
GovInfoSecurity.com (blog)
Jordan to host cross border cybersecurity drill
PanARMENIAN.Net
The workshop aims to equip participants with expert professional knowledge ofcyber incident response and handling. ... The workshop aspires to nurture a culture of information security and assist in developing technical capabilities on CIRT operations ...
PanARMENIAN.Net
McCain Amends SECURE IT Cybersecurity Bill to Address Privacy Concerns
HSToday
"We have worked closely with members and stakeholders over the past months, and we believe we have come up with a consensus bill that will significantly advance the security of our government and private sector networks," Hutchison said in a statement ...
How good is your security? A new DOE tool will help you find out
Smart Grid News
Part of an overall White House initiative to develop a Cyber Security Capability Maturity Model for the electricity industry, the new tool "helps electric utilities and grid operators identify opportunities to further develop their own cyber security ...
Smart Grid News
Recorded Future for Forecasting Cyber Attacks
SYS-CON Media (press release) (blog)
Recorded Future also has wider, more unconventional applications, however, with monitoring and forecasting cyber attacks among the most interesting use cases. Much of current commentary on cybersecurity treats attacks like unstoppable, unknowable ...
CBMs In Cyber Space: What Should Be India's Approach? – Analysis
Eurasia Review
By Arvind Gupta The use of cyber space for crime, terrorism and warfare has brought to sharp focus the issue of cyber security. Further, recent reports. ... Thus proposals have been made to the effect that states should not be the first to launch a ...
National cyber center unveils plan for working with industry
Federal Times (blog)
The new National Cybersecurity Center of Excellence (NCCoE) launched in February is a project of the National Institute of Standards and Technology (NIST). It aims to bring companies together to create and discuss security management solutions that can ...
ENISA proposes a kick-start in EU cyber insurance
TechEye
The European Network and Information Security Agency (ENISA) is calling on insurance providers to make cybersecurity a key policy.However, a security expert told us the agency may struggle to get ... It said that while cyber security seemed to be an ...
Kaspersky flags up Olympic cyber security threats
IT PRO
Speaking to IT Pro, David Emm, senior regional research at Kaspersky, said end users might also find themselves under siege from cyber criminals attempting to cash-in on the event. “One of the dangers is people being lured by mistake to an illegitimate ...
IT PRO
You are under attack – how to avoid cyber threats
Emirates 24/7
Give assurance that no action will be taken against them, but will be given the right treatment.
Lost in translation: Anonymous hacks Japanese government…almost
RT
Japanese can be a tricky language, even for hackers. The hacktivist collectiveAnonymous found that out the hard way when one of their attempts to attack a Japanese government website went awry with bizarre results.
RT
Chinese Cyber Attacks Are Looting US Private Sector
Security Debrief
Yet, one issue that receives too little public attention is the blatant use of hackers by China to steal U.S. intellectual property, defense technology, and other data critical to national securityand competitiveness. ... China is robbing us blind and ...
Utilities leading the way to grid security with new assessment tool, DOE ...
R & D Magazine
"Secure delivery of electricity is vital to our nation, and utilities play a vital role in ensuring that the power system is protected from cyber-attack," said Carl Imhoff, electricity infrastructure sector manager at the Department of Energy's Pacific ...
MI5's cyber-attack warning
The News International
MI5's cyber-attack warning. Updated 2 days ago. From Web Edition. LONDON: MI5 is working to counter "astonishing" levels of cyber-attacks on UK industry, the organisation's chief has said. In his first public speech for two years, Jonathan Evans warned ...
The News International
Revised McCain cybersecurity bill still doesn't protect privacy, say critics
FierceGovernmentIT
The definition of what constitutes "cyber threat information" is also somewhat tighter in the new version, although it includes a clause permitting the sharing of "any other attribute of acybersecurity threat or cyber defense information that would ...
Black Hat: Developer Aims To Make Attack Recovery More Intelligent
Dark Reading
Protect The Business - Enable Access. Dark Reading | Security | Protect The Business - Enable Access. WEBCAST: Intelligent Cyber Defense Learn how your enterprise can use security intelligence to beat the bad guys at their own game. Watch it now!
Fraud Ring In Hacking Attack On 60 Banks
Sky News
Sixty million euro has been stolen from bank accounts in a massive cyber bank raid after fraudsters raided dozens of financial institutions around the world. According to a joint report by software security firm McAfee and Guardian Analytics, more than ...
Privacy Groups Reject Senate Republicans' Tweaks to the SECURE IT Act
Game Politics
According to a post on The Hill privacy groups remain unimpressed with efforts to draft a revised version of the SECURE IT Act. Senate Republicans released a revised version of theircybersecurity bill on Wednesday, but privacy groups shrugged off the ...
WA Govt departments weak to social engineering: Auditor
iT News
"None of the agencies we tested had appropriate systems or processes in place to detect or respond to a cyber attack," the audit stated. The auditor noted, however, that its security tests "were not sophisticated and we did not fully explore all ...
US industrial control system attack reports skyrocket
CSO Magazine
US critical infrastructure providers are failing to implement adequate information securitymeasures, according to the US Industrial Control System Cyber Emergency Response Team (ISC-CERT). The security team, set up in 2009 under the Department of ...
The arguments for (and against) an Internet kill switch
FCW.com
Panelists at MeriTalk's June 26 cybersecurity discussion on Capitol Hill explored the hotly debated issue of an Internet kill switch – a single shutoff mechanism that would halt all online traffic during a cyber emergency. In the event an agency has a ...
High Roller Report a Wake Up Call for Indian Banks: McAfee CTO
CIO India
Latest news on : While report suggests cyber attackers are pilfering large amounts from big corporate accounts in several countries, McAfee's APAC CTO asks Indian Banks to be cautious.... “This report highlights that criminals are continually evolving ...
Apple's Mountain Lion to offer automatic security updates
Register
Earlier this month it emerged that the Flame cyber-espionage tool had used a "man-in-the-middle" attack against the Windows update system. If Apple introduces security updates over SSL connections then it will move ahead of the game in thwarting this ...
Cybersecurity in the Pacific Northwest
Emergency Management (blog)
... exposure was the addition of a cybersecurity exercise to the mix of events prior to 2003 TOPOFF2 Exercise that had a dirty bomb scenario. Then the Pacific Northwest Economic Region (PNWER) got on the bandwagon with a Blue Cascades Cyber Security ...
GOP returns fire on cybersecurity legislation battle in US Senate
Infosecurity Magazine
The Department of Homeland Security (DHS) conducted a mock spearphishing attack on itself to demonstrate the need for comprehensive cyberscurity legislation to pass the US Senate. Senate majority leader ... and other Republican sponsors have tightened ...
Government at high risk of economic espionage
FCW.com
With cyber theft and other crime on the rise, agencies must get aggressive in defense, according to the GAO. ... 10 trends shaping the federal IT future · Budget pressures, workforce woes and cyber threats converge · A faster, better, cheaper way to do ...
Beware of email offers this Olympics season!
Hindu Business Line
Cyber criminals never miss an opportunity to launch stealth attacks. They use the same old techniques of prize baits but top it with fresh seasonal flavour. This time around they have chosen Olympics season to initiate a fresh malware attack to attract ...
Hindu Business Line
Covering your digital footprints
DefenseNews.com (subscription)
Government employees, particularly in the fields of intelligence, law enforcement, nationalsecurity and defense, make highly effective use of the Internet as a research tool, but more emphasis needs to be placed on ensuring cyber adversaries can't ...
Mikko Hypponen on the concept of cyber war | Privacy PC
By david b.
Already when we today label things like denial of service attacks, or hacking into services ascyber war, what are we gonna call it then, when we see a real attack, when countries are at war and use armies to attack computer systems of another ... saw in Estonia 2007, what we've seen with the Anonymous attacks – I wouldn't call it cyber war. Cyber gang war is a much better description. Because it is individual groups, this hive mind that takes the life of its own. But it really isn't warfare.
Privacy PC
Cybercrime Disclosures Rare Despite New SEC Rule
By The Huffington Post News Editors
Wyndham's 2011 annual report said the "hospitality industry is under increasing attack by cyber-criminals in the U.S. and other jurisdictions in which we operate" and noted that it was involved in "claims relating to information security and data ...
The Huffington Post | Full News Feed
Chemical Facility Security News: ICS-CERT Incident Report
By PJCoyle
Chemical Facility Security News. News and views about chemical facility security, transportation of hazardous chemicals, and the federal laws and rules governing the same. ... The last two were determined not to be related to a cyber-attack.
Chemical Facility Security News
Recorded Future for Forecasting Cyber Attacks
By FedCyberTeam
Recorded Future also has wider, more unconventional applications, however, with monitoring and forecasting cyber attacks among the most interesting use cases. Much of current commentary on cybersecurity treats attacks like unstoppable, ...
FedCyber.com
A quick look at cyber security in Jamaica | ICT Pulse
By mmarius
Although the focus of the seminar were the talks by Paladion Networks' Chief Operating Officer, Vinod Vasudevan, ICT Pulse's Publisher, Michele Marius, was invited to share some views intocyber security in the Caribbean, based on her many ... can be lost in time, revenue, productivity and remediation when an incident occurs, a CERT can be an invaluable resource supplementing the internal security measures, and critical support should an attack or other incident be experienced.
ICT Pulse
Does Hyperconnectivity Make Us Safe? - The Dish | By Andrew ...
By Andrew Sullivan
Identity theft and cyber-espionage are not among the greatest threats to world security. No one has ever died as a result of a cyber-attack. Truly existential threats—if the 20th-century's death-tolls tell us anything—include scourges like war, ...
The Daily Dish | By Andrew Sullivan
Is it time for treaties governing the use of cyber weapons? | Security ...
By Neil Roiter
News and analysis of the latest cyber attacks, security threats, network security, mobile security, data protection and much more. ... This entry was posted in Security Threats and tagged cyberweapons, Flame, Stuxnet, treaty. Bookmark the ...
Security Bistro
GAO Summary of Cyber Economic Espionage Threat | InfoWar.com
By admin
“The U.S. Government Accountability Office has released findings from a cyber security study which focused on the economic espionage aspects of the cyber threat. Their report, available at: GAO-12-876T : Cyber Threats Facilitate Ability To ...
InfoWar.com
Federal Cybersecurity and Information Technology News Round-up ...
Cyber assurance for government mission accomplishment. Government Cyber Assurance. Subscribe to Government Cyber Assurance: eMailAlerts Email Alerts newsletters Weekly Newsletters Get Government Cyber Assurance: Homepage · Mobile · RSS ... The Social SecurityAdministration is renewing a computer matching program with the Department of HomelandSecurity that establishes the conditions, safeguards, and procedures for disclosure of information relating to aliens.
Latest News from Government Cyber...
Is NATO Deterring Itself? - Lindley-French's Blog Blast
By Lindley-French's Blog Blast
DDPR has four elements; nuclear deterrence, missile defence, defence against cyber-attack and the maintenance of a sufficient number of linked up, moveable fighting soldiers to deter or strike back at any aggressor be it a state or a terrorist ...
Lindley-French's Blog Blast:...
Cyber attack is 'single largest threat' to U.S.: House Intelligence ...
WASHINGTON—Cyber attacks represent “probably the single largest threat” facing the United States, the chairman of the U.S. House of Representatives ...
www.businessinsurance.com/article/20120618/.../120619903
Cybersecurity and American power - Foreign and Defense Policy - AEI
Cybersecurity and American power. Addressing new threats to America's economy and military. Monday, July 09, 2012 | 3:00 p.m. – 5:00 p.m.. AEI, Twelfth Floor ...
www.aei.org/events/2012/.../cybersecurity-and-american-powe...
Follow @sobeqorg