FireEye Interview from Venturebeat on Vimeo.
Dylan's Desk: New security threats target intellectual property, infrastructure
VentureBeat
“Everything's digital, and everything that's digital can be attacked through a cyber attack,” he said. “That's what keeps the good guys in the security industry awake at night, is the possible 9/11-like scenarios that could exist out there. We have to ...
Mounting, costly Cyber crimes, spying spur another call for protection
Government Security News
The chairman of the Senate Homeland Security and Governmental Affairs Committee again raised the call to push Cyber security legislation forward after the top U.S. Cyber warrior warned electronic crime and espionage was costing billions of dollars per ...
Lieberman Calls for Cybersecurity Legislation in Response to Alarm by DOD's ...
HSToday
In response, Senate Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman (I-Conn.) said Tuesday that Gen. Keith Alexander, commander of US Cyber Command (USCYBERCOM), “offered a startling set of statistics … on the ...
NSA Chief Says Spy Agency Does Not Read Private Email
The New American
The head of the NSA is urging Congress to act quickly to prevent cyber-attacks on the nation's Internet infrastructure. by Joe Wolverton, II. ... On Monday, the head of the National Security Agency (NSA) urged Congress to act swiftly to establish ...
Private emails will remain private under cyber legislation, NSA chief says
Federal Times
Keith Alexander, director of the National Security Agency, said in an address before the American Enterprise Institute. Cybersecurity can be carried out while protecting privacy and civil liberties, he said. Alexander did not highlight a specific cyber ...
Pentagon cyber chief lies about NSA email snooping; says attack is 'coming our ...
RT
National Security Agency Director Army Gen. Keith Alexander, who also heads the Pentagon's Cyber Command unit, tells reporters this week that the US is coming close to being hit with a computer attack that could devastate the country. Speaking before a...
RT
Our View: Cybersecurity – This Is The Time For Action
Yankton Daily Press
Keith Alexander, the head of the Pentagon's Cyber Command, when he spoke at an American Enterprise Institute event in Washington Monday. The general called on Congress to take immediate action on beefing up this nation's cybersecurity. He said, in ...
NSA Chief: Cyber Attacks Cause All the World's Ills
CIO (blog)
NSA chief and Army General Keith B. Alexander wants more federal funding to combat cyberattacks, so he's talking up the threat and making some grossly exaggerated statements, according to CIO.com blogger Constantine von Hoffman. ... Alexander also ...
Cyber War
Washington Free Beacon
The commander of the military's new U.S. Cyber Command said digital attacks are evolving from disrupting network functions to destructive strikes. Army Gen. Keith Alexander, the Cybercom commander who is also head of the National Security Agency ...
ABB in Cyber Arms Race With IBM and HP as Industries Collide
Bloomberg
The extent of industrial cyber-security attacks is clouded by the fact that companies are loathe to admit incidents. Chrysler Group LLC is estimated to have lost $14 million dollars in three hours during a 2005 attack by the Zotob worm which blocked ...
NSA chief plugs federal standards to regulate industry computers
Nextgov
Privacy trumps cybersecurity, poll shows. Over half .... Industry, the Obama administration and both congressional chambers currently debating a long-stalled cyber bill generally agree that any measure must include civil liberties protections and ...
Kaspersky asks int'l community for rules on 'cyber warfare'
Philippine Star
Kaspersky internet security firm owner Eugene Kaspersky has urged the international community to set rules on "cyber warfare" as he warns of "a new period of global conflict" with the release of malwares Flame, Stuxnet and Duqu. ... He said that the ...
Alexander: US looking for offensive alternatives in cyberspace
FierceGovernmentIT
What might be considered war in the physical domain may not be considered war in the cyberdomain, said Gen. Keith Alexander, head of Cyber Command and the National Security Agency, July 9 at an American Enterprise Institute event in Washington, ...
Cybersecurity: a wake-up call
Business Recorder (blog)
If the president of United States complains that the growing number of attacks on their cybernetworks has become `one of the most serious economic an. ... are in place to effectively managecybersecurity. India has also realized that there is an ...
Govts should focus on cybersecurity education, not militarization
ZDNet (blog)
In Singapore, for instance, the Cyber Security Awareness Alliance leveraged various social media platforms such as Facebook and Twitter to engage the community's interest and share tips on ITsecurity, he noted. Howard Schmidt, former special assistant ...
New “Safer Web Browsing” Security Training Module from Wombat Security ...
San Francisco Chronicle
... vulnerabilities, phishing and social engineering. Wombat is helping Fortune 500 customers, large government agencies and small to medium businesses in segments such as finance, banking, higher education, insurance, and consumer packaged goods...
San Francisco Chronicle
No “Internet Doomsday,” but the US Needs Better Cyber Awareness
Heritage.org (blog)
On Monday, the FBI shut down Internet servers that were used as a temporary fix to a worldwidemalware attack. The virus, known by various names, is a DNS changer that was started around 2007 by a ring of Estonian cyber criminals. The virus infected a ...
DHS teams hunt for weaknesses in federal cyber networks
FederalNewsRadio.com
... find the soft spots-places where cybersecurity defenses are weakest and pose the greatest risks. DHS' Federal Network Security branch, under the National Protection and Programs Directorate, is having little trouble finding agencies' soft cyber ...
Deterrence Doesn't Work in Cyberspace: CCSA
AOL Defense
"While Stuxnet is considered the new pinnacle of cyber threats" because it was able to do – limited – physical damage to real-world machinery, the report argues, "cyber espionage, not cyber attackor cyber war, is currently the most pressing risk for ...
Gen. Anderson: Info Sharing Between the Government and Critical Infrastructure ...
ExecutiveGov
Before a crowded audience at the libertarian leaning American Enterprise Institute, General Keith Alexander, chief of both the National Security Agency and the U.S. Cyber Command advocated for information sharing legislation between private companies ...
The Defense Department aspires to unify technology systems, contracts and ...
Nextgov
To heighten security and lower costs, Defense is attempting to build a “joint information environment” that would simplify military computing, officials on Tuesday told military personnel at a talk sponsored by Nextgov's parent company Government ...
Privacy Trumps Cybersecurity, Poll Shows
National Journal
Updated: July 11, 2012 | 6:56 a.m.. July 10, 2012 | 9:33 p.m.. AP Photo/Mark J. Terrill. Cyber security analysts work in the "watch and warning center" during the first tour of the governmentĂs secretive cyber defense lab Thursday, Sept. 29, 2011, in ...
NSA Director: U.S. Is Most Vulnerable To Cyber Attacks
TPM
General Keith Alexander, the Director of National Security Agency and the commander of U.S.Cyber Command said in a speech at a conservative think-tank Monday that America is the most vulernable country in the world to cyber attacks, the Pentagon ...
NSA Pushes For Better Monitoring Of Cyberattacks
RedOrbit
That's according to General Keith Alexander, Commander of U.S. Cyber Command; Director of the National Security Agency; and Chief of the Central Security Service. General Alexander spoke about a need for the government to pass better laws against...
RedOrbit
ICF International and SecureState to Provide Cybersecurity Services to Energy ...
MarketWatch (press release)
The team approach will provide an unparalleled set of services for clients in the energy/cybermarket," said Andy Robinson, senior vice president for ICF International. ... SecureState is a management consulting firm specializing in information security.
Protective measures for SCADA
Computerworld Australia
Regardless of how easy it is to attack SCADA systems, one thing is clear: The impact of a successful attack can be catastrophic. The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting ...
NSA takes on Cyber Attacks
MassNewsMedia
Alexander was speaking at an American Enterprise Institute event in Washington D.C. last Monday. In his push for cyber-legislation, Alexander stated that it is possible to protect civil liberties at the same time protect the country from cyber-threat ...
MassNewsMedia
"God particle" hackers train Indian officials
NDTV
"God particle" hackers train Indian officials : Two cyber security experts, who claimed to have cracked the security code of IT systems involved in... ... It will be lead bycyber warfare where most attack will be on nation's secret data. The idea to ...
NDTV
Ex-PLA man tied to Diet cyber-attacks / Stolen data possibly sent to his e-mail
The Daily Yomiuri
An e-mail address used by a former senior member of China's People's Liberation Army was used as a destination to receive information stolen in cyber-attacks on both houses of the Diet in the summer of 2011, The Yomiuri Shimbun has found. The man had ...
Post-website attack, cops hot on pursuit of Anonymous hackers
Times of India
The cyber crime wing has formed special teams to nab the hackers who attacked and stole data from the Tamil Nadu police website. ... Police register fresh case in quarrel between 2 actors,security guard held · Decision on deemed university students ...
TappIn Partners with Antivirus Leader ESET to Provide Content Security and ...
MarketWatch (press release)
"ESET has long been at the forefront of computer security with industry-leading virus and malwaredetection that protect against a host of evolving threats," said Chris Hopen, President of TappIn, Inc. "This partnership puts secure mobility at the ...
Computer experts ace challenge, invited to cybersecurity 'boot camp'
Bennington Banner
Part of what USCC does is hold online competitions called Cyber Quests, which ask participants to analyze computer systems that are vulnerable to attacks and to determine how a hacker may get past the system's security. A recent Cyber Quest both Weber ...
The Devastating Effects of a Cyber-Attack Against - Oil Price
By llew@oilprice.com (Llewellyn King)
The Devastating Effects of a Cyber-Attack Against a Countries Energy Grid. By Llewellyn King | Tue, 10 July 2012 ... A slip let some of the worm be detected on the Internet by American securitycompanies like Symantec. They named it Stuxnet.
OilPrice.com Daily News Update
Cyber command head calls for legislative action now | Uplogix ...
By Uplogix
... of the Cyber Command and head of the National Security Agency called for legislation to enable and encourage infrastructure organizations like electrical grids and banks to quickly tell the government when they are under cyber attack.
Uplogix Network Automation Blog
Georgetown Security Law Brief: Cybersecurity chief urges ...
By Georgetown CNSL
General Keith Alexander, who also heads US Cyber Command, said such data-sharing was necessary if the NSA and Cyber Command are to defend the nation against a cyberattack from a foreign adversary. Several cybersecurity bills are ...
Georgetown Security Law Brief
Malware Monday Mostly Nothing To Worry About
By Doug Mataconis
... might kick in as people start to ignore warnings in the future. The media probably did hype the story a bit much, but one of these days we're going to wake up to a real cyber attack of some kind and we'll need all the warnings we can get.
Outside the Beltway
The Devastating Effects of a Cyber-Attack Against a Countries ...
The Devastating Effects of a Cyber-Attack Against a Countries Energy Grid. From: Home - 5:47pm - July 10, 2012. Computer war has grown up. It has moved from the age of the equivalent of black powder to the equivalent of high-explosive ...
eWallstreeter
The inconvenience of cyber-security – Jacinta Tobin – The Kernel
By Jacinta Tobin
The inconvenience of cyber-security. Jacinta Tobin Tuesday, 10 July 2012. padl. Jacinta Tobin, chief marketing officer at Cloudmark, asks whether businesses have become too comfortable with the benefits of an internet economy. Jack Welch ...
The Kernel
Deploying cyber war games to test your crisis plan | SMI
By Bernhard Warner
A cyberwar game is organized around a business scenario (such as cybercriminals using “spearphishing” attacks to target high-net-worth customers for fraud). It is structured to simulate the experience of a real attack. Participants receive ...
SMI
Four ways the Internet could go down | WTVR.com – Richmond ...
By Scott Wise
When one examines the physical conflicts between India and Pakistan, the Israelis and Palestinians or the parties in the collapse of Yugoslavia, the escalation of real-world violence is immediately mirrored by cyber-space warfare. ... The bill, Protecting Cyberspace as a National Asset Act (PCNAA), proposed to give the president “emergency authority to shut down private sector or government networks in the event of a cyber attack capable of causing massive damage or loss of life.” ...
WTVR.com – Richmond News &...
By Scott Wise
When one examines the physical conflicts between India and Pakistan, the Israelis and Palestinians or the parties in the collapse of Yugoslavia, the escalation of real-world violence is immediately mirrored by cyber-space warfare. ... The bill, Protecting Cyberspace as a National Asset Act (PCNAA), proposed to give the president “emergency authority to shut down private sector or government networks in the event of a cyber attack capable of causing massive damage or loss of life.” ...
WTVR.com – Richmond News &...
Raytheon: App Stores To Take Over ISR | Defense Tech
By mike.hoffman
He said here Tuesday at the Farnborough International Airshow that he also sees a future not necessarily littered with drones and one where cyber protection is even more important. To keep up, the U.S. ... This influx of programs will further place emphasis on cyber security, Raytheon officials said. ... An enemy with even moderate air defenses will make them much tougher to operate, especially if an adversary can attack the downlink connecting the UAV to the pilot. Griffiths said he...
Defense Tech
How to Defend Against a Cyberattack - Yahoo! Finance
U.S. businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates and hacker collectives, ...
finance.yahoo.com/.../defend-against-cyberattack-162114855....
Can we eliminate the prospect of cyber attack? | Video | Oxford ...
How can a responsible 21st century state prevent or limit the possibility of cyber attack when the threats do not necessarily come from within state boundaries?
www.oxfordmartin.ox.ac.uk/videos/view/177
I-CIO - Cyber security stress test
This is one of the key messages from a recent study of global cyber security ... many systems can be attacked at once — a process referred to as “hyper-jacking.
www.i-cio.com/features/july-2012/cyber-security-stress-test
Follow @sobeqorg