October 12, 2011 Added by:Marjorie Morgan
Everyone can track security legislation in Congress through the “Cybersecurity Legislation Tracker”. This is a valuable resource that provides notice and summaries of significant cybersecurity developments on Capitol Hill, including hearings, proposed bills, and task force activities...
October 07, 2011 Added by:Headlines
"The system they have recommended provides a pathway for a sustainable system to of cyber security that will result in securing our nations critical infrastructure while stimulating the IT engine that has provided most of the good news our economy has experienced over the last 20 years..."
October 05, 2011 Added by:Headlines
“Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage..."
October 04, 2011 Added by:Kevin L. Jackson
Cloud computing is unique in its ability to address critical defense and intelligence needs. That’s why the cloud is critical to our national defense. As a bonus, cloud computing offers defense and intelligence agencies the ability to increase efficiency and incur cost savings...
September 27, 2011 Added by:Kevin L. Jackson
Security is an issue with client management interfaces with the public cloud provider. These services are provided via the internet and permit access to a larger set of resources than traditional operating systems. Security risk can dramatically increase when this is combined with remote access...
September 20, 2011 Added by:Kevin L. Jackson
Cloud outages can be a potential risk—and can have widespread implications for consumers of cloud services. This risk becomes even more severe if a mission-critical environment could be impacted. Security concerns have also slowed the widespread adoption of cloud computing...
September 19, 2011 Added by:Bill Gerneglia
It’s more than just a salary cut. Officials working for private companies also get bonuses, stock options and a better benefits package than those working in the public sector. So who in their right mind would tolerate the smaller paycheck in exchange for a bunch of headaches?
September 15, 2011 Added by:Kevin L. Jackson
The use of commodity components, coupled with highly automated controls, enable cloud computing. These characteristics also enable the economic model that makes it so disruptive to the status quo. As an example, the cloud delivery model typically does not require any advance usage commitment...
September 14, 2011 Added by:Headlines
"The potential benefits of Smart Grids are enormous, they can only be fully reached if we can all agree on global solutions. It is promising to see that NIST and SG-CG will be supporting common positions and areas of collaboration to ensure a consistent set of international standards..."
September 11, 2011 Added by:Scot Terban
The AQ core will continue to reach out to the lonely and dispossessed to radicalize the newcomers as well as use the technologies we have created (privacy/hacking utilities included) to effect the outcomes they desire and we need to be able to counter them...
September 08, 2011 Added by:John Linkous
Many asked why, given that Agencies had the latest incident and event management technologies, the breach had not at least been spotted sooner - even if they were unable to prevent it completely. What followed is a response unlike any I've seen to date in the commercial sector...
September 01, 2011 Added by:Headlines
Hurtado accessed U.S. Bank’s computer system and changed the contact information for the accounts of two elderly customers at the bank. After changing their contact information, Hurtado then allegedly closed these accounts and took out cashier’s checks for the balance of each account...
August 31, 2011 Added by:Kevin L. Jackson
FedPlatform.org has been formed as a collaborative initiative to help federal organizations safely learn about and evaluate PaaS technologies. The initiative supports the Federal Cloud Computing Strategy and the Federal CIO’s 25-Point Federal IT Reform Plan...
August 25, 2011 Added by:Headlines
The DHS's National Cybersecurity and Communications Integration Center (NCCIC) is warning that malicious users may seek to exploit interest related to physical events such as earthquakes and hurricanes by generating phishing emails with subject lines related to the incidents...
August 25, 2011 Added by:Headlines
Friday, August 26, 2011 from 12:00 p.m. – 1:00 p.m. EDT: The purpose of the call is to update partners on DHS IP Hurricane Irene planning and preparation activities, procedures, and capabilities should the hurricane make landfall and significantly impact critical infrastructure operations...
August 23, 2011 Added by:Chris Blask
The rather petulant tone of the advisory indicates problems with the way our system is setup as well as insufficient process and staffing being applied to outbound communications. Certainly, advisories with content and tone like this one are not a step in the right direction...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013