Blog Posts Tagged with "Cyber Security"

6d117b57d55f63febe392e40a478011f

House Subcommittee Passes Legislation to Protect Critical Infrastructure

January 21, 2014 Added by:Anthony M. Freed

The House of Representatives Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies has passed a bill to bolster provisions to protect the nation’s critical infrastructure, moving it one step closure to full consideration.

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

The Interim Years of Cyberspace - The Quick(er) Version

January 15, 2013 Added by:Robert M. Lee

A quick(er) look at the publication: "The Interim Years of Cyberspace." The publication was intended for a military audience but this post tries to apply some of those lessons and thesis points to the larger InfoSec community...

Comments  (0)

296634767383f056e82787fcb3b94864

The "January Effect" - An Annual Phenomenon Since 2009

December 16, 2012 Added by:Jeffrey Carr

A phenomenon that I've noticed each year since 2009 - a major breach or act of cyber warfare that kicks off the New Year. It may start in December and then get publicized in January, or happen in January and get publicized a bit later but it has happened four years in a row now so I fully expect it to occur once again...

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

The Four Horsemen of the Cyber-Apocalypse: Security Software FUD

December 15, 2012 Added by:Tripwire Inc

Did the title of this post get your attention? We are doomed! The sky is falling! All of your computers are infected! We are just one security breach away from complete human extinction! The security software industry is guilty of overhyping cyber threats to sell their products, second only to Hollywood...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Sophos Security Threat Report 2013, today... tomorrow

December 07, 2012 Added by:Pierluigi Paganini

Sophos was one of the first security firms that has published a report on the security landscape the upcoming year. The document provides an interesting overview on most common and dangerous cyber threats to determine the level of penetration in different countries...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Our Massively Dysfunctional Cyber System

November 28, 2012 Added by:Joel Harding

What should be done to stop theft of intellectual property by state actors (China) would require a Presidential Finding but our leadership structure is devoid of real leaders. That is not a political statement, that is a statement about our country...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

European Commission supports research on Cyber security

November 28, 2012 Added by:Pierluigi Paganini

Cyber security is considered a primary target for every governments, the increase of cyber criminal activities, state-sponsored operations and the rise of hacktivism requires the use of additional resources to counteract these phenomena...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Four Turning Points in Cybersecurity History

November 18, 2012 Added by:Tripwire Inc

Enterprises adopted reputable standards for secure configurations, and implemented repeatable practices for creating secure infrastructure. This shift dramatically reduced the attack surface of enterprises, greatly increasing the difficulty of achieving a successful attack...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Joining hands against cybercrime in Africa

November 08, 2012 Added by:Pierluigi Paganini

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

US Cyber Security Direction

November 07, 2012 Added by:Jayson Wylie

President Obama stated an Executive Order to be instilled which may be in a better direction but nothing definitive or out yet nor am I expecting a solid direction or hitting upon the finer notes in the short term. Let’s not kid ourselves. Having a point-of-presence on the Internet is dangerous...

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Industrial Control System Security: A Reliability Issue?

November 06, 2012 Added by:Larry Karisny

Cyber Security Expert Joe Weiss has spearheaded the ICS Cyber Security Conference for 12 years and when he calls in the troops, the best come to serve. Last month’s conference held at Old Dominion University's Virginia Modeling Analysis and Simulation Center -- VMASC in Suffolk, Va. -- was no different...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Cybersecurity Matters in The Election

November 05, 2012 Added by:Robert Siciliano

Whomever is elected president will face an unknown unseen digital enemy unlike any other president has seen in history. Think before you click. Know who’s on the other side of that instant message. What you say or do in cyberspace stays in cyberspace — for many to see, steal and use against you or your government...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Canada´s audit on cyber threats to national critical infrastructure

October 25, 2012 Added by:Stefano Mele

The Office of the Auditor General of the Canada revealed in an audit made public October 23 that "the cyber threat environment is evolving more rapidly than the Canada government´s ability to keep pace"...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Paying Lip Service (Mostly) to User Education

October 24, 2012 Added by:Fergal Glynn

The connection between improved security and user education is so well-established as to be almost axiomatic. Better technology, coding practices and testing can only accomplish so much. So what’s being done about the dearth of solid user education?

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Impressive Speaker Lineup Announced for TECHEXPO Cyber Security Event

October 23, 2012 Added by:Infosec Island Admin

"Our team is extremely pleased with the high caliber, diversity and expertise of the confirmed speakers we have secured for this event. Having such a dynamic lineup of highly respected industry professionals to share their knowledge and inspire those seeking employment..."

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Dutch Govt Expresses Intent To Draft New Cybercrime Legislation

October 17, 2012 Added by:Matthijs R. Koot

On October 15th 2012, the Dutch Minister of Security & Justice (Ivo Opstelten) sent this letter to the Dutch parliament expressing intentions to draft new cybercrime legislation in the Netherlands. Here is my Dutch-to-English translation of the entire letter...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »