Politico
Eighty percent of critical energy infrastructure systems have been the victim of a cyber-attack, according to a survey by McAfee and the Center for Strategic and International Studies. Protecting these systems is a security imperative, and our national security ...
Politico
Ron Wyden offers rules for government cyber-snooping
OregonLive.com
Either way, Wyden's amendments would reshape a bill that originally was designed to fortify crucial industries such as power plants and chemical facilities, water plants and banks from cyber attack. Wyden's amendments are among a large group of provisions ...
OregonLive.com
US Cyber Commander urges Senate on electronic protections
Government Security News
“Comprehensive cyber security legislation also needs to ensure that this infrastructure is sufficiently hardened and resilient, as it is the storehouse of much of our economic prosperity,” he said. “Key to addressing this peril is the adoption of minimum ... So while we're looking at the Defense Authorization and Appropriations Bill and people want more aircraft carriers to defend us in the blue water against China, what happens if there's a cyber-attack? Now, we do know how to protect dot-mil, do we want to protect also ...
Senate sets up cyber vote for Thursday, still working on amendments
The Hill (blog)
“I thought we'd all put national security above partisan politics.” Reid put blame on the ... TheCybersecurity Act would increase cyber protections for the nation's electrical grid, financial networks, transportation system and other critical infrastructure. Reid also ...
Durbin pressing cyber protections as legislation bogs down
STLtoday.com
But after concerns from business groups about intrusive new rules, the bill shifted to voluntary participation with incentives, such as liability protection and security clearances, awarded companies that take part in a cybersecurity program. Sen. Roy Blunt, R-Mo., ... While Durbin is a strong proponent of curbing cyber threats, he engineered more than a dozen changes to the legislation dealing with civil liberties and privacy protections, according to a summary of his involvement provided by staff members. For instance ...
Iran Denies Nuclear Plants Hit by Virus Playing AC/DC
Businessweek
Iran denied that its nuclear facilities suffered a cyber attack that shut down computers and played music from the rock band AC/DC, the state-run Iranian Students News Agency reported, citing the head of Iran's Atomic Energy Organization, Fereidoun Abbasi. ... A new worm targeted Iran's nuclear program, closing down the “automation network” at the Natanz and Fordo facilities, the F-Secure Security Labs website said this month, citing an e- mail it said was sent by a scientist inside Iran's Atomic Energy Organization.
US 'underprepared for cyber attacks on CNI' says CYBERCOM chief
IHS Jane's
The United States scores just three out of ten when it comes to preparedness for a seriouscyber attack on a critical part of the country's national infrastructure, according to the commander of US Cyber Command and head of the National Security Agency, ...
Cybersecurity at Risk
New York Times
Officials and experts have warned about cybersecurity dangers for years; now the alarms are more insistent. On Thursday, Gen. Keith Alexander, the chief of the United States CyberCommand and the director of the National Security Agency, said intrusions ...
Power grid failure features in US lawmakers' cyber law debate
Economic Times
WASHINGTON: The US needs to learn lessons from the massive blackouts in India, top US lawmakers have said, pushing for the passage of a law on cyber security even though the Indian power crisis is not the result of any cyber-attack. "All one needs to do ...
Northrop Grumman and UMBC Cite Progress After Cyber 'Cync' Program's First ...
MarketWatch (press release)
"This university-industry partnership is helping companies develop solutions to guard against current and future cyber threats, and it's bringing some of the best minds in cybersecurity to our campus," said Freeman Hrabowski, president of UMBC. "The companies provide educational and ... The Cync program's aim is to identify, develop and commercialize solutions that meet the needs of the departments of Defense, Homeland Security and Justice, as well as the intelligence community. Companies focus their work on ...
Anonymous attack protests web laws, catches innocents
ABC Online
It's an ordinary Tuesday evening, save for one thing: the family's been dragged into a cyber war over national security, innocent victims of a hacking attack on their former telco provider AAPT. These are some of the customer names. Just thousands of them.
Senate cyber security bill met with caution by private sector
Alaska Dispatch
Cybersecurity legislation, stalled for months, is now moving forward in Congress, with the Senate poised to begin debate on whether the bill's voluntary standards for private industry will protect America from devastating cyberattacks or are still just too onerous ...
Facilitator is needed for cybersecurity
Politico
Any solution to cybersecurity must allow the private sector, which owns 85 percent of our nation's critical infrastructure, the freedom to use all tools at its disposal to protect against cyber intrusions. Business owners understand the need to ... It includes the Chamber of Commerce, the American Petroleum Institute, the InternetSecurity Alliance, the Business Roundtable, IBM, the National Rural Electric Cooperative Association and the National Association of Manufacturers. They are raising legitimate concerns that the ...
Politico
OVERNIGHT TECH: Lieberman pessimistic on cybersecurity
The Hill (blog)
In the letters, Alexander indirectly took issue with Senate Republicans' call to pass acybersecurity bill that focuses primarily on improving information sharing about cyber threats. The four-star general argued that cybersecurity legislation must include security ...
Dems fume at Chamber as cybersecurity talks flounder
The Hill (blog)
The Chamber has said the provisions in that section would impede the ability of businesses to share cyber threat information directly with the Department of Defense and the National SecurityAgency, and has called for wider liability protections. Members met ...
News bites: New York Times urges Senate to pass cyber bill
The Hill (blog)
News bites: New York Times urges Senate to pass cyber bill. By Brendan Sasso - 08/01/12 09:06 AM ET. Tweet. In an op-ed, The New York Times urged the Senate to pass theCybersecurity Act before the country suffers a catastrophic attack. Google failed to ...
As Senate Cybersecurity Vote Looms, Advocates Push For Privacy
TPM
By contrast, the newest version of the Lieberman-Collins Cybersecurity Act of 2012 would force companies to go through the Department of Homeland Security or other civilian agencies first. ... The Obama Administration and specifically the head of U.S. Cyber Command, General Keith Alexander, are also supportive of theCybersecurity Act of 2012, though Alexander noted in a letter to Senate leaders on Tuesday that: “Information sharing alone, however, is insufficient to address the vulnerabilities to the nation's core ...
TPM
Reid Invokes Cloture As Cybersecurity Bill Prospects Dim
Broadcasting & Cable
It also provides for sharing cyber threat info among critical infrastructure providers, like telecom companies, and with the government, including liability immunity from suits related to breaches and attacks. With communications ... Achieving Operational Freedom in Digital Media Workflows · The New Normal for Promoting Tune-in · Infrastructure Design for High Volume Video Workflows · Multi Format Encoding for Efficient Content Repurposing · The CIOs Guide to Videoconferencing Security Keeping Pace with th.
Demonoid Down 2012: Torrent Site Hit By DDoS Cyber Attack, Won't Be ...
TravelersToday
Demonoid, one of the biggest torrent sites on the internet, has been down for a few days as it was hit by a DDoS cyber attack. The site is not expected to run any time soon as the issue will be difficult to fix. The site has been inaccessible to its millions of users ...
TravelersToday
5 Olympic Cyber Risks to Watch Out For
CIO (blog)
5 Olympic Cyber Risks to Watch Out For. Just a few of the ways the crooks are trying ... Drive-byAttack – Malware can automatically begin downloading to your device during a visit to an infected website, email or pop-up ad. Cybercriminals link this software to ...
UmeNow: Cybersecurity First, Say No to Self-Regulation by Giant Corporations
Virtual-Strategy Magazine
"Cybersecurity legislation that does not mandate baseline security standards -- to protect our critical cyber and communication infrastructure -- sounds like a perfect storm for bringing our country to its knees," stated Evelyn Castillo-Bach, founder and CEO of ...
Debate over private sector role stymies Senate cyber bill
FederalNewsRadio.com
A battle over the role companies should play in keeping the U.S. safe from cyber attacks threatens to kill cybersecurity legislation in the Senate. Senate ... The Chamber opposes keysecurity measures for businesses, even though they would be voluntary.
Full Senate begins consideration of cyber security legislation
SC Magazine
With the Senate on Tuesday afternoon set to begin discussions on a proposed cyber securitybill, lawmakers are racing to include their own revisions. The Cybersecurity Act of 2012 -- which has received blessing from the White House -- would incentivize ...
The US Senate receives bills for amendments in cyber security prior to the ...
News Pakistan
Sen. Harry Reid is pushing to get cyber security legislation voted on this week before the Senate breaks for recess in August. Democrat-based Cybersecurity Act of 2012, sponsored by Sen. Joseph Lieberman, is already in the making to reaching an agreed ...
News Pakistan
Iran rejects report of computer virus hitting nuclear facilities
Press TV
Head of the Atomic Energy Organization of Iran (AEOI) Fereydoun Abbasi has rejected reports about a possible cyber attack against the Islamic Republic's nuclear facilities. “Do you believe this report? If not, then no such thing has happened,” Abbasi told a ...
Press TV
Cybersecurity's Last Gasp? Reid Files for Cloture
Lawfare (blog)
Lawfare. Hard National Security Choices ... This type of parliamentary maneuver can only mean one of two things — either Senator Reid thinks he has enough votes to force cloture and bring the bill to conclusion or he has decided not to accept any Republican amendments and force a procedural vote that will stand as both party's talking point on cyber for the coming election. Since it seems almost certain that the first of these is not the case, one can only conclude that Reid thinks the bill is dead and is now playing ...
Lawfare (blog)
Radware's Attack Mitigation System Wins 2012 Innovation Award from TMC Labs
MarketWatch (press release)
"In order to combat today's increasing threat landscape, security managers are required to deploy multiple detection and protection tools such as Intrusion Prevention Systems (IPS), Denial of Service (DoS) Protection, Network Behavioral Analysis (NBA), ... As literal "first responders" to cyber attacks, Radware's ERT members gained their extensive experience by successfully dealing with some of the industry's most notable hacking episodes, providing the knowledge and expertise to mitigate the kind of attack a ...
USA is 3 out of 10 in cyber, Deployed soldiers will be carrying
SYS-CON Media (press release) (blog)
US CYBERCOM commander, General Alexander reports that the US is only a 3 of 10 in cyberpreparedness. Alexander further stated that they are focusing on defense, due to the difficulties with cyber attack attribution. ... He has extensive industry experience in intelligence and securityand was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by ...
Privacy or Security? Cybersecurity Act Poses Tough Questions for the Senate
Article 3
The much discussed Cybersecurity Act of 2012, scheduled for a Senate vote this week, would make it easier for businesses to share information about cyber threats with the government. Essentially, the Act provides avenues for companies to collect sensitive ...
AFCEA TechNet Land Forces East Event Comes To Baltimore Convention Center
Sacramento Bee
The operational theme, "Cyberspace Operations - Prevent, Shape, Win" will highlight the operational security focus of DoD and Industry Networks, and Cyber Operations with Joint and Coalition partners, to prevent, shape, and win future cyber conflicts. ... Fortune 500® companies, small businesses, and Maryland-based organizations will showcase hundreds of technologies and solutions, including: communication systems, electronic warfare equipment, information systems security, intelligence gathering systems, ...
Quick Poll: Has Your Business Been Cyber-Attacked? | NSBA
By Molly Brogan
Quick Poll: Has Your Business Been Cyber-Attacked? August 1, 2012 | Posted by: Molly Brogan. Has your business ever been subject to a cyber attack (e.g. banking trojan, malware, phishing e-mail, etc.)? Yes; No. View Results. Loading .
NSBA
OregonLive.com
Either way, Wyden's amendments would reshape a bill that originally was designed to fortify crucial industries such as power plants and chemical facilities, water plants and banks from cyber attack. Wyden's amendments are among a large group of provisions ...
OregonLive.com
US Cyber Commander urges Senate on electronic protections
Government Security News
“Comprehensive cyber security legislation also needs to ensure that this infrastructure is sufficiently hardened and resilient, as it is the storehouse of much of our economic prosperity,” he said. “Key to addressing this peril is the adoption of minimum ... So while we're looking at the Defense Authorization and Appropriations Bill and people want more aircraft carriers to defend us in the blue water against China, what happens if there's a cyber-attack? Now, we do know how to protect dot-mil, do we want to protect also ...
Senate sets up cyber vote for Thursday, still working on amendments
The Hill (blog)
“I thought we'd all put national security above partisan politics.” Reid put blame on the ... TheCybersecurity Act would increase cyber protections for the nation's electrical grid, financial networks, transportation system and other critical infrastructure. Reid also ...
Durbin pressing cyber protections as legislation bogs down
STLtoday.com
But after concerns from business groups about intrusive new rules, the bill shifted to voluntary participation with incentives, such as liability protection and security clearances, awarded companies that take part in a cybersecurity program. Sen. Roy Blunt, R-Mo., ... While Durbin is a strong proponent of curbing cyber threats, he engineered more than a dozen changes to the legislation dealing with civil liberties and privacy protections, according to a summary of his involvement provided by staff members. For instance ...
Iran Denies Nuclear Plants Hit by Virus Playing AC/DC
Businessweek
Iran denied that its nuclear facilities suffered a cyber attack that shut down computers and played music from the rock band AC/DC, the state-run Iranian Students News Agency reported, citing the head of Iran's Atomic Energy Organization, Fereidoun Abbasi. ... A new worm targeted Iran's nuclear program, closing down the “automation network” at the Natanz and Fordo facilities, the F-Secure Security Labs website said this month, citing an e- mail it said was sent by a scientist inside Iran's Atomic Energy Organization.
US 'underprepared for cyber attacks on CNI' says CYBERCOM chief
IHS Jane's
The United States scores just three out of ten when it comes to preparedness for a seriouscyber attack on a critical part of the country's national infrastructure, according to the commander of US Cyber Command and head of the National Security Agency, ...
Cybersecurity at Risk
New York Times
Officials and experts have warned about cybersecurity dangers for years; now the alarms are more insistent. On Thursday, Gen. Keith Alexander, the chief of the United States CyberCommand and the director of the National Security Agency, said intrusions ...
Power grid failure features in US lawmakers' cyber law debate
Economic Times
WASHINGTON: The US needs to learn lessons from the massive blackouts in India, top US lawmakers have said, pushing for the passage of a law on cyber security even though the Indian power crisis is not the result of any cyber-attack. "All one needs to do ...
Northrop Grumman and UMBC Cite Progress After Cyber 'Cync' Program's First ...
MarketWatch (press release)
"This university-industry partnership is helping companies develop solutions to guard against current and future cyber threats, and it's bringing some of the best minds in cybersecurity to our campus," said Freeman Hrabowski, president of UMBC. "The companies provide educational and ... The Cync program's aim is to identify, develop and commercialize solutions that meet the needs of the departments of Defense, Homeland Security and Justice, as well as the intelligence community. Companies focus their work on ...
Anonymous attack protests web laws, catches innocents
ABC Online
It's an ordinary Tuesday evening, save for one thing: the family's been dragged into a cyber war over national security, innocent victims of a hacking attack on their former telco provider AAPT. These are some of the customer names. Just thousands of them.
Senate cyber security bill met with caution by private sector
Alaska Dispatch
Cybersecurity legislation, stalled for months, is now moving forward in Congress, with the Senate poised to begin debate on whether the bill's voluntary standards for private industry will protect America from devastating cyberattacks or are still just too onerous ...
Facilitator is needed for cybersecurity
Politico
Any solution to cybersecurity must allow the private sector, which owns 85 percent of our nation's critical infrastructure, the freedom to use all tools at its disposal to protect against cyber intrusions. Business owners understand the need to ... It includes the Chamber of Commerce, the American Petroleum Institute, the InternetSecurity Alliance, the Business Roundtable, IBM, the National Rural Electric Cooperative Association and the National Association of Manufacturers. They are raising legitimate concerns that the ...
Politico
OVERNIGHT TECH: Lieberman pessimistic on cybersecurity
The Hill (blog)
In the letters, Alexander indirectly took issue with Senate Republicans' call to pass acybersecurity bill that focuses primarily on improving information sharing about cyber threats. The four-star general argued that cybersecurity legislation must include security ...
Dems fume at Chamber as cybersecurity talks flounder
The Hill (blog)
The Chamber has said the provisions in that section would impede the ability of businesses to share cyber threat information directly with the Department of Defense and the National SecurityAgency, and has called for wider liability protections. Members met ...
News bites: New York Times urges Senate to pass cyber bill
The Hill (blog)
News bites: New York Times urges Senate to pass cyber bill. By Brendan Sasso - 08/01/12 09:06 AM ET. Tweet. In an op-ed, The New York Times urged the Senate to pass theCybersecurity Act before the country suffers a catastrophic attack. Google failed to ...
As Senate Cybersecurity Vote Looms, Advocates Push For Privacy
TPM
By contrast, the newest version of the Lieberman-Collins Cybersecurity Act of 2012 would force companies to go through the Department of Homeland Security or other civilian agencies first. ... The Obama Administration and specifically the head of U.S. Cyber Command, General Keith Alexander, are also supportive of theCybersecurity Act of 2012, though Alexander noted in a letter to Senate leaders on Tuesday that: “Information sharing alone, however, is insufficient to address the vulnerabilities to the nation's core ...
TPM
Reid Invokes Cloture As Cybersecurity Bill Prospects Dim
Broadcasting & Cable
It also provides for sharing cyber threat info among critical infrastructure providers, like telecom companies, and with the government, including liability immunity from suits related to breaches and attacks. With communications ... Achieving Operational Freedom in Digital Media Workflows · The New Normal for Promoting Tune-in · Infrastructure Design for High Volume Video Workflows · Multi Format Encoding for Efficient Content Repurposing · The CIOs Guide to Videoconferencing Security Keeping Pace with th.
Demonoid Down 2012: Torrent Site Hit By DDoS Cyber Attack, Won't Be ...
TravelersToday
Demonoid, one of the biggest torrent sites on the internet, has been down for a few days as it was hit by a DDoS cyber attack. The site is not expected to run any time soon as the issue will be difficult to fix. The site has been inaccessible to its millions of users ...
TravelersToday
5 Olympic Cyber Risks to Watch Out For
CIO (blog)
5 Olympic Cyber Risks to Watch Out For. Just a few of the ways the crooks are trying ... Drive-byAttack – Malware can automatically begin downloading to your device during a visit to an infected website, email or pop-up ad. Cybercriminals link this software to ...
UmeNow: Cybersecurity First, Say No to Self-Regulation by Giant Corporations
Virtual-Strategy Magazine
"Cybersecurity legislation that does not mandate baseline security standards -- to protect our critical cyber and communication infrastructure -- sounds like a perfect storm for bringing our country to its knees," stated Evelyn Castillo-Bach, founder and CEO of ...
Debate over private sector role stymies Senate cyber bill
FederalNewsRadio.com
A battle over the role companies should play in keeping the U.S. safe from cyber attacks threatens to kill cybersecurity legislation in the Senate. Senate ... The Chamber opposes keysecurity measures for businesses, even though they would be voluntary.
Full Senate begins consideration of cyber security legislation
SC Magazine
With the Senate on Tuesday afternoon set to begin discussions on a proposed cyber securitybill, lawmakers are racing to include their own revisions. The Cybersecurity Act of 2012 -- which has received blessing from the White House -- would incentivize ...
The US Senate receives bills for amendments in cyber security prior to the ...
News Pakistan
Sen. Harry Reid is pushing to get cyber security legislation voted on this week before the Senate breaks for recess in August. Democrat-based Cybersecurity Act of 2012, sponsored by Sen. Joseph Lieberman, is already in the making to reaching an agreed ...
News Pakistan
Iran rejects report of computer virus hitting nuclear facilities
Press TV
Head of the Atomic Energy Organization of Iran (AEOI) Fereydoun Abbasi has rejected reports about a possible cyber attack against the Islamic Republic's nuclear facilities. “Do you believe this report? If not, then no such thing has happened,” Abbasi told a ...
Press TV
Cybersecurity's Last Gasp? Reid Files for Cloture
Lawfare (blog)
Lawfare. Hard National Security Choices ... This type of parliamentary maneuver can only mean one of two things — either Senator Reid thinks he has enough votes to force cloture and bring the bill to conclusion or he has decided not to accept any Republican amendments and force a procedural vote that will stand as both party's talking point on cyber for the coming election. Since it seems almost certain that the first of these is not the case, one can only conclude that Reid thinks the bill is dead and is now playing ...
Lawfare (blog)
Radware's Attack Mitigation System Wins 2012 Innovation Award from TMC Labs
MarketWatch (press release)
"In order to combat today's increasing threat landscape, security managers are required to deploy multiple detection and protection tools such as Intrusion Prevention Systems (IPS), Denial of Service (DoS) Protection, Network Behavioral Analysis (NBA), ... As literal "first responders" to cyber attacks, Radware's ERT members gained their extensive experience by successfully dealing with some of the industry's most notable hacking episodes, providing the knowledge and expertise to mitigate the kind of attack a ...
USA is 3 out of 10 in cyber, Deployed soldiers will be carrying
SYS-CON Media (press release) (blog)
US CYBERCOM commander, General Alexander reports that the US is only a 3 of 10 in cyberpreparedness. Alexander further stated that they are focusing on defense, due to the difficulties with cyber attack attribution. ... He has extensive industry experience in intelligence and securityand was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by ...
Privacy or Security? Cybersecurity Act Poses Tough Questions for the Senate
Article 3
The much discussed Cybersecurity Act of 2012, scheduled for a Senate vote this week, would make it easier for businesses to share information about cyber threats with the government. Essentially, the Act provides avenues for companies to collect sensitive ...
AFCEA TechNet Land Forces East Event Comes To Baltimore Convention Center
Sacramento Bee
The operational theme, "Cyberspace Operations - Prevent, Shape, Win" will highlight the operational security focus of DoD and Industry Networks, and Cyber Operations with Joint and Coalition partners, to prevent, shape, and win future cyber conflicts. ... Fortune 500® companies, small businesses, and Maryland-based organizations will showcase hundreds of technologies and solutions, including: communication systems, electronic warfare equipment, information systems security, intelligence gathering systems, ...
Quick Poll: Has Your Business Been Cyber-Attacked? | NSBA
By Molly Brogan
Quick Poll: Has Your Business Been Cyber-Attacked? August 1, 2012 | Posted by: Molly Brogan. Has your business ever been subject to a cyber attack (e.g. banking trojan, malware, phishing e-mail, etc.)? Yes; No. View Results. Loading .
NSBA
FBI expert claims cyber security is the second most significant threat ...
By briony.williams@commissum.com (briony)
Henry put the spotlight on the need for more trained and experienced people in the field ofcyber-security, and on the need for a speedy response to this time-sensitive issue. He pointed out that a cyber-attack would have the potential to affect ...
Latest Entries
iN.SG Newsletter | Tackling cyber security challenges
By iN.SG Newsletter
Mr Howard Schmidt may have stepped down from public service when he retired as Special Assistant to the President and the Cybersecurity Coordinator for President Barack Obama, but he continues to play an active role in the cyber security ...
iN.SG Newsletter
Hackers wanted for careers at NSA | SiliconANGLE
By John Casaretto
Exceptional talent in this field is extremely difficult to find and difficult to nurture. The NSA and front lines of cybersecurity need the edge that a hacker brings to the security picture, outside the constraints of manuals, procedures, and checklists.
SiliconANGLE
A Cybersecurity Campaign to Drive Change in Energy Sector « A ...
By Guest
And some industries have even gone so far as to police themselves with their own securitystandards. Now it's time for electric utilities and other energy companies to elevate cyberresilience in their business planning and investment decisions ...
A Smarter Planet Blog
Michael Assante Holds Forth on Cybersecurity Leadership
By Andy Bochman
Labels: cyber attack, leadership, organizational structure, security metrics ... I'm a frequent speaker, writer and adviser on topics at the intersection of grid modernization, renewables, energy efficiency. military energy and cyber security. Also, I: ...
The Smart Grid Security Blog
With Online Accounts under Constant Attack, Strong Passwords are ...
By Fearless Web Team
Passwords are imperfect but then again so is online security. Staying safe online is just about doing the best you can and being alert to the threats. ... Criminal gangs motivated by money and even hacktivists hoping to prove a moral point know there are valuable goodies to be had behind the cyber walls guarding the databases of these web firms. And they have the tools to break through many defenses. Professional social networking site LinkedIn and online dating site eHarmony are ...
fearlessweb
How to Keep Your Business Safe from Online Threats - Denise ...
By Denise Richardson
The National Cyber Security Alliance/Symantec research on small businesses has shown that two thirds (66%) say that their business is dependent on the Internet for its day-to-day operations. Today's businesses face several major online ...
Denise Richardson
By Karen DeWitt
Its failure could come from cyber- terrorism, but equally from solar flares, geomagnetic forces, earthquakes and other natural disasters as well as simple lack of maintenance and investment. Paul Stockton, assistant secretary for Homeland Defense and America's Security Affairs at the Department of Defense, told an audience at the Aspen Security Forum in June that a breakdown in the U.S. electric grid would produce “long term, ... Staged cyber attack reveals vulnerability in power grid ...
Baltimore Post-Examiner
Its failure could come from cyber- terrorism, but equally from solar flares, geomagnetic forces, earthquakes and other natural disasters as well as simple lack of maintenance and investment. Paul Stockton, assistant secretary for Homeland Defense and America's Security Affairs at the Department of Defense, told an audience at the Aspen Security Forum in June that a breakdown in the U.S. electric grid would produce “long term, ... Staged cyber attack reveals vulnerability in power grid ...
Baltimore Post-Examiner
Meet the 112th | Facilitator needed for cybersecurity
By Politico
Any solution to cybersecurity must allow the private sector, which owns 85 percent of our nation's critical infrastructure, the freedom to use all tools at its disposal to protect against cyberintrusions. Business owners ... It includes the Chamber of Commerce, the American Petroleum Institute, the Internet Security Alliance, the Business Roundtable, IBM, the National Rural Electric Cooperative Association and the National Association of Manufacturers. They are raising legitimate concerns ...
Meet the 112th
For Those in Glass Houses
By Dan Blum
Has some U.S. defense or intelligence agency developed a sense of humor? Is it a form of psychological warfare? Who knows. The attack could equally have come from a hacktivist group or individual prankster. It's very important to attribute ...
Dan Blum
Frank Lautenberg Refuses To Pull Gun Control Amendment From ...
By The Huffington Post News Editors
Frank Lautenberg (D-N.J.) said Tuesday that he won't pull his gun control amendment from a sweeping cybersecurity bill being debated in the Senate this week, despite calls from some colleagues to get rid of it. Sen. Joe Lieberman (I-Conn.) issued a plea from the Senate floor asking people ... This is ridiculous, what justification is there for inclusion of gun control measures in a cyber-security bill? All he'll succeed in doing is paralyzing a bill that could be easily passed without such an ...
The Huffington Post | Full News Feed
Senate cybersecurity bill mirrors Russian Internet agenda Alex ...
Josh Peterson Daily Caller August 1, 2012. Language within the embattledCybersecurity Act ...
www.infowars.com/senate-cybersecurity-bill-mirrors-russian-i...
Emails from Iran - F-Secure Weblog : News from the Lab
The scientist reached out to publish information about Iranian nuclear systems getting struck by yet another cyber attack. He wrote: I am writing you to inform you ...
www.f-secure.com/weblog/archives/00002403.html
Follow @sobeqorg