Blog Posts Tagged with "Cyber Security"
November 21, 2011 Added by:Chris Blask
Monitoring of water treatment networks using common SIEM or log management tools offers the kind of capability that can address the need for visibility into control system behavior. The ICS networks found in water facilities are deterministic systems with highly predictable behavior...
November 20, 2011 Added by:John Nicholson
Companies now face the unenviable task of deciding what aspects of cyber incidents or risks are “material” and disclosing them, with the knowledge that the sophisticated and determined nature of cyber-attackers makes predicting the nature of an attack and its consequences incredibly difficult...
November 18, 2011 Added by:Headlines
"While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation..."
November 16, 2011 Added by:Headlines
"When warranted, we will respond to hostile attacks in cyberspace as we would to any other threat to our country. We reserve the right to use all necessary means - diplomatic, informational, military and economic - to defend our nation, our allies, our partners and our interests..."
November 15, 2011 Added by:Headlines
“India welcomes the decision of the EastWest Institute to bring this powerful forum to New Delhi. Working together with like-minded countries and businesses worldwide, India will work hard to assure that practical advances in cybersecurity are made and international cooperation advanced..."
November 10, 2011 Added by:Headlines
NIST, the Department of Education and NCEC will work with state and local counterparts to enhance cybersecurity education programs for kindergarten through 12th grade, higher education and vocational programs to provide skilled cybersecurity workers for both the private sector and government...
November 09, 2011 Added by:Robert Siciliano
Dishonesty poses a challenge to banks and retailers in the form of theft. Theft is a big problem on the Internet, and any online business knows that they can’t afford to trust you, regardless of how honest you may be. The FFIEC recently instructed retailers and banks to enhance their security...
November 09, 2011 Added by:Headlines
The framework organizes cybersecurity work into high-level categories ranging from the design, operation and maintenance of cybersecurity systems to incident response, information gathering and analysis. The document is meant to define professional requirements in cybersecurity...
November 08, 2011 Added by:Headlines
"Making such dramatic changes to the power grid requires an overarching vision of how to accomplish the task, and this updated Framework advances that vision. Utilities, manufacturers, equipment testers and regulators will find essential information... that was not previously available..."
November 04, 2011 Added by:Headlines
"The Cyber Atlantic exercise is part of the ongoing EU-U.S. partnership to strengthen mutual capabilities for addressing emerging threats to global networks... stakeholders focus on cyber incident management, enhancing public-private partnerships, and raising awareness about cyber threats..."
November 01, 2011 Added by:Headlines
"Building the most resilient cyber defenses in the world will not help if you are suffering from intellectual property theft. Trusted computing underpins security and can underpin growth, providing confidence in transactions, expanding markets and making them function more efficiently..."
October 25, 2011 Added by:Joel Harding
What really set him apart was Social Engineering combined with his hacking. He did his research, he would study, he would probe, and then he would do whatever it took to get a password, to get a free account, to get root access, to get into a facility and physically touch the system...
October 21, 2011 Added by:Headlines
"DHS says the newly created cybersecurity position will allow the department to better carry out its mission to create a safe, secure and resilient cyberspace... Weatherford will focus on ensuring robust cybersecurity operations and communications resilience for DHS..."
October 20, 2011 Added by:Headlines
"Adequate security controls have not been implemented on the [Mission Operating Environment] to protect the data processed from unauthorized access, use, disclosure, disruption, modification, or destruction," the Inspector General concluded...
October 20, 2011 Added by:Headlines
“There is a clear need for unifying principles within and across application domains. Investigating how cyber components can be synergistically interweaved with the diverse physical components in CPS pose foundational research challenges in science, engineering and computing..."
October 17, 2011 Added by:Stefano Mele
Prime Minister David Cameron presented a response to issues raised by the Intelligence and Security Committee (ISC) in its 2010–2011 Annual Report, which expressed concerns at the inability of GCHQ, the British intelligence service, to retain internet specialists to respond to threats...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013