Blog Posts Tagged with "Information Sharing"
January 27, 2013 Added by:Tripwire Inc
One place I’ve actually seen effective information and practice sharing is through Information Sharing and Analysis Centers, or ISACs. These tend to be industry- or domain-specific groups that get together and share information about common concerns, challenges, and opportunities...
November 08, 2012 Added by:Pierluigi Paganini
Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...
September 19, 2012 Added by:Christopher Laing
For collective intelligence directed at security breaches, I would argue, that an effective means of transparently sharing details without fear of recrimination and embarrassment would greatly reduce the impact of such breaches. Fine idea, but how can this be achieved?
August 29, 2012 Added by:Infosec Island Admin
It only takes a single infected computer to potentially infect thousands of others. Partnerships are required across all levels of government, the private sector and internationally to share information about emerging threats and how to stop them, and coordinate mitigation efforts in response to cyber incidents...
August 22, 2012 Added by:Headlines
The event brought together state Chief Information Security Officers and other cyber security professionals from the nation's state, local and territorial governments, along with representatives from the U.S. Department of Homeland Security and industry experts for briefings on current cyber threats...
August 08, 2012 Added by:Headlines
"In today's world where cyber has become a strategy in war, America's Counties are key players in homeland security; commissioners, supervisors, and local policy makers have to become educated on this issue and be ready to protect our citizens from breaches of confidentiality and more..."
August 07, 2012 Added by:Electronic Frontier Foundation
The FBI wants to be able to search and identify people in photos of crowds and in pictures posted on social media sites—even if the people in those photos haven’t been arrested for or even suspected of a crime. The FBI may also want to incorporate those crowd or social media photos into its face recognition database...
June 14, 2012 Added by:Headlines
The European Network and Information Security Agency (ENISA) organized two small-scale cyber security exercises on 30th May and 6th June. The exercises were held to familiarize participants with cross-border cooperation procedures and mechanisms for dealing with large-scale cyber crises in Europe...
June 11, 2012 Added by:Ed Bellis
All of these breaches present a great opportunity to learn what does and doesn’t work in information security. But when we get responses like the one posted by Last.FM not only do we not learn anything, we don’t have any reason to believe they have either...
May 24, 2012 Added by:Headlines
In February 2012, a 58 million Euro contract was awarded to establish a NATO Cyber Incident Response Capability (NCIRC), to be fully operational by the end of 2012. A Cyber Threat Awareness Cell is also being set up to enhance intelligence sharing and situational awareness...
May 23, 2012 Added by:Infosec Island Admin
Earlier this month, we gave the green light to two long-awaited Defense Industrial Base (DIB) efforts designed to help companies protect critical information. The programs allow eligible DIB companies and the Government to share cybersecurity information...
May 22, 2012 Added by:Headlines
Malware such as Stuxnet and Duqu have led to the recognition of broader systemic vulnerabilities within critical infrastructure which until recently have been largely disconnected. Addressing the resiliency of these systems must occur at technical, organizational and policy levels...
May 18, 2012 Added by:Gregory Hale
If an attacker wants to target a system, they will get in no matter what, what kind of damage occurs depends on how many layers of security buttress the system. Companies in specific industries could band together and share information on attacks that target their industries...
May 18, 2012 Added by:Headlines
This statement of intent will help enhance situational awareness and information sharing on cybersecurity issues, increase collaboration and sharing of cybersecurity best practices, and create opportunities for training and cooperation in cyber exercises...
May 14, 2012 Added by:Infosec Island Admin
The United States continues to face a significant risk that critical Defense information networks can be compromised by malicious actors resulting in economic losses or damage to national security. The DIB CS/IA Program is designed to improve DIB network defenses...
May 09, 2012 Added by:Infosec Island Admin
One of the best kept secrets in the critical infrastructure world is the US-CERT secure portal, a web-based platform that provides a mechanism for secure, unclassified information exchange between government agencies and the private sector asset owners and operators...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013