January 09, 2012 Added by:Headlines
The project, a White House initiative led by the DOE in partnership with the DHS, will leverage private industry and public sector experts to build on existing cybersecurity strategies to create a more comprehensive and consistent approach to protecting the nation’s energy delivery system...
December 20, 2011 Added by:Stefano Mele
Due to the high complexity, it is major challenge to ensure adequate maritime cyber security. Development of good practices for the technology development and implementation of ICT systems would therefore ensure “security by design” for all critical maritime ICT components...
December 19, 2011 Added by:Jeffrey Carr
"In a letter to partners, North America channel chief Randy Cochran says the contract manufacturing relationship between Symantec and Huawei will remain unaffected, as will Symantec’s commitment to marketing and developing appliance-based solutions..."
December 19, 2011 Added by:Headlines
Eighty-three innovators, inventors and engineers signed the letter that specifically calls for Congress to reject the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA) in an attempt to prevent government efforts to codify broad Internet censorship powers...
December 16, 2011 Added by:Headlines
“Changes made to the document reflect changes in the state of the art. There are new techniques and tools available to government agencies, and this provides them more flexibility in choosing the best authentication methods for their individual needs, without sacrificing security..."
December 13, 2011 Added by:Joel Harding
The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...
December 13, 2011 Added by:Don Eijndhoven
As for cyber warfare, there are various internationally accepted legal frameworks and that can provide some help. Consider the Law of Armed Conflict or Universal Human Rights, both of which have received wide adoption and have led to increased cooperation among nation states...
December 01, 2011 Added by:Kelly Colgan
The basic concept is actually quite simple: Companies should include privacy concepts and controls into new products and services during their development stage rather than treating privacy as an afterthought or ignoring it altogether...
November 28, 2011 Added by:Kevin L. Jackson
GovCoud is the “go to” place for everything related to federal cloud computing. Our mission is to help federal organizations learn about, try and securely adopt cloud computing technologies. This site will provide a community hub for information dissemination and GovCloud best practices...
November 23, 2011 Added by:Headlines
"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."
November 23, 2011 Added by:Headlines
While news that there was not a systems breach at the facility is certainly welcome, the conclusions of ICS-CERT and the FBI fail to provide an explanation as to why the Illinois Statewide Terrorism and Intelligence Center initially believed the facility had been compromised...
November 22, 2011 Added by:Headlines
ICS-CERT has not received any additional reports of impacted manufacturers of ICS or other ICS related stakeholders related to these events... any information about possible impacts to additional entities, it will disseminate timely mitigation information as it becomes available...
November 18, 2011 Added by:Headlines
"While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation..."
November 07, 2011 Added by:Headlines
"We are shifting our investments to activities that promise more convergence with the threat and that recognize the needs of the DoD. Malicious cyber attacks are not merely an existential threat to our bits and bytes. They are a real threat to our physical systems..."
November 02, 2011 Added by:Mark Gardner
I know things change at a rapid pace in It and Security but, as a Security Professional and a UK taxpayer, why the constant writing of strategies. Surely the best defense for the UK is to actually not give the details of what the government is proposing to do?
Good Security Starts at Home... Amire sohail on 10-30-2014
Is BYOD a Nightmare for IT Security or a Dre... Yuri Andrew on 10-30-2014
New Zero-day in Microsoft OLE Being Exploite... Lisa Harris on 10-30-2014