Blog Posts Tagged with "CSIS"
February 19, 2012 Added by:Rafal Los
This is just a chance to create some new regulatory-agency office, hire a bunch of new auditors, attorneys, experts, and waste more time rather than actually making critical infrastructure more risk-averse...
October 11, 2011 Added by:Headlines
Botnets have increasingly put computer owners at risk. Researchers estimate that about 4 million new botnet infections occur each month. When a computer is infected by a botnet, personal information and communications can be monitored and Internet access can be exploited...
July 19, 2011 Added by:Don Eijndhoven
A study done by the CSIS speaks of a human capital crisis in Cyber Security and may offer some insights that can also be used outside of the US. CSIS mentions that there are a variety of people and skills needed. From the report we learn that CSIS found a shortage in the following roles...
April 19, 2011 Added by:Headlines
"The message is that our industrial control systems are very, very vulnerable to attack and the security we have installed today is insufficient to protect us. I'm concerned that (the industry) is not getting that message, despite having the evidence in front of us..."
March 11, 2011 Added by:Headlines
Senator Sheldon Whitehouse is turning up the heat on the Obama administration to follow through on a comprehensive federal cyber security overhaul. During a Senate hearing this week, Whitehouse pressed Homeland Security Secretary Janet Napolitano for updates on the administration's position...
February 11, 2011 Added by:Headlines
"We can continue to pursue outdated strategies and spend our time describing the problem until there is some crisis. Then it is likely that the United States will act, in haste, possibly with unfortunate consequences. Alternatively, we can take action on measurably effective policies...."
New Zero-day in Microsoft OLE Being Exploite... Lisa Harris on 10-30-2014
What PCI Requirements Apply to Us: Tacking a... shahbaz ocpfsd1 on 10-29-2014
Today's Mobile Device Data Protection Must G... karna karn on 10-29-2014