Blog Posts Tagged with "Information Sharing"

D35585b7d1a9ebbeb200b032aac3606a

A Sharing Economy for Security

September 25, 2015 Added by:Anne Bonaparte

Hackers trade information to make their attacks more effective. If organizations want to beat back the bad guys, they must also learn to share.

Comments  (0)

B8645aab12b6ba5e561fccefbf46cc0c

Challenges and Solutions of Threat and Vulnerability Sharing in 2015

June 29, 2015 Added by:Shawn Masters

Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection

Comments  (0)

279d808ff27c98d0dff8c5f1e8a19a8e

The Security Industry and a Look Ahead

December 03, 2014 Added by:Art Coviello

I am cautiously optimistic about the prospects for collaboration and collective progress in the private sector as companies and industries are recognizing that in the digital world, no one is an island. We’re more like an archipelago and we’re starting to build bridges.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Information Sharing and Asymmetric Advantage

January 27, 2013 Added by:Tripwire Inc

One place I’ve actually seen effective information and practice sharing is through Information Sharing and Analysis Centers, or ISACs. These tend to be industry- or domain-specific groups that get together and share information about common concerns, challenges, and opportunities...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Joining hands against cybercrime in Africa

November 08, 2012 Added by:Pierluigi Paganini

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...

Comments  (0)

Ee5e595fc2be8a24327ce7cefe0f7b2c

Breaches: Digital Transparency, WARPs, and Collective Intelligence

September 19, 2012 Added by:Christopher Laing

For collective intelligence directed at security breaches, I would argue, that an effective means of transparently sharing details without fear of recrimination and embarrassment would greatly reduce the impact of such breaches. Fine idea, but how can this be achieved?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Strengthening Partnerships to Address Cyber Threats

August 29, 2012 Added by:Infosec Island Admin

It only takes a single infected computer to potentially infect thousands of others. Partnerships are required across all levels of government, the private sector and internationally to share information about emerging threats and how to stop them, and coordinate mitigation efforts in response to cyber incidents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MS-ISAC Meeting Explores Advanced Persistent Threats

August 22, 2012 Added by:Headlines

The event brought together state Chief Information Security Officers and other cyber security professionals from the nation's state, local and territorial governments, along with representatives from the U.S. Department of Homeland Security and industry experts for briefings on current cyber threats...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Center for Internet Security Joins NACo Cyber Security Task Force

August 08, 2012 Added by:Headlines

"In today's world where cyber has become a strategy in war, America's Counties are key players in homeland security; commissioners, supervisors, and local policy makers have to become educated on this issue and be ready to protect our citizens from breaches of confidentiality and more..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FBI’s Facial Recognition is Coming to a State Near You

August 07, 2012 Added by:Electronic Frontier Foundation

The FBI wants to be able to search and identify people in photos of crowds and in pictures posted on social media sites—even if the people in those photos haven’t been arrested for or even suspected of a crime. The FBI may also want to incorporate those crowd or social media photos into its face recognition database...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ENISA: Cybersecurity Exercises Enhance Cooperation

June 14, 2012 Added by:Headlines

The European Network and Information Security Agency (ENISA) organized two small-scale cyber security exercises on 30th May and 6th June. The exercises were held to familiarize participants with cross-border cooperation procedures and mechanisms for dealing with large-scale cyber crises in Europe...

Comments  (0)

48f758be63686a73484a7380e94f73d0

If I Told You, I'd Have to Kill You

June 11, 2012 Added by:Ed Bellis

All of these breaches present a great opportunity to learn what does and doesn’t work in information security. But when we get responses like the one posted by Last.FM not only do we not learn anything, we don’t have any reason to believe they have either...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO and Cyber Defense

May 24, 2012 Added by:Headlines

In February 2012, a 58 million Euro contract was awarded to establish a NATO Cyber Incident Response Capability (NCIRC), to be fully operational by the end of 2012. A Cyber Threat Awareness Cell is also being set up to enhance intelligence sharing and situational awareness...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Howard Schmidt on Partnership Developments in Cybersecurity

May 23, 2012 Added by:Infosec Island Admin

Earlier this month, we gave the green light to two long-awaited Defense Industrial Base (DIB) efforts designed to help companies protect critical information. The programs allow eligible DIB companies and the Government to share cybersecurity information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Former DHS Director Sean Paul McGurk Joins ICS ISAC

May 22, 2012 Added by:Headlines

Malware such as Stuxnet and Duqu have led to the recognition of broader systemic vulnerabilities within critical infrastructure which until recently have been largely disconnected. Addressing the resiliency of these systems must occur at technical, organizational and policy levels...

Comments  (0)

2dc39ef06d1ad53bea80d28b84f3aa7e

Companies Hit in Targeted Attacks

May 18, 2012 Added by:Gregory Hale

If an attacker wants to target a system, they will get in no matter what, what kind of damage occurs depends on how many layers of security buttress the system. Companies in specific industries could band together and share information on attacks that target their industries...

Comments  (1)

Page « < 1 - 2 > »