Blog Posts Tagged with "Cyber Security"
August 29, 2011 Added by:Steven Fox, CISSP, QSA
DefCon Kids follows the trend towards developing cybersecurity skills in youth, so that these young professionals will one day be prepared to tackle the increasingly advanced cyber attacks that constantly threaten today’s enterprises...
August 25, 2011 Added by:Headlines
The DHS's National Cybersecurity and Communications Integration Center (NCCIC) is warning that malicious users may seek to exploit interest related to physical events such as earthquakes and hurricanes by generating phishing emails with subject lines related to the incidents...
August 22, 2011 Added by:Infosec Island Admin
Free Webinar: NESCO is charged by the DoE with providing information on collaboration, tactical awareness, rapid notification, forensics and applied research. Steve Parker, NESCO Lead, will be hosting the session along with AlienVault's Chris Blask and Trusted Metrics' Michael Menefee...
August 17, 2011 Added by:Headlines
"This is a punitive model where we're trying to blame the victims of the attack. I don't think that the administration's proposal really does anything that I can see to enhance cybersecurity," said Larry Clinton, President of the Internet Security Alliance...
August 16, 2011 Added by:Headlines
The plan, "Building a Digital Nation," outlines NICE's mission, vision, goals and objectives. NIST and its interagency NICE partners seek comments from all interested citizens and organizations concerned with cybersecurity awareness, training and education...
August 15, 2011 Added by:Headlines
Clinton’s election to the ITSCC is critical at this point in time, as some of the legislative efforts underway may serve to fundamentally alter the public-private partnership envisioned in the National Infrastructure Protection Plan and the Obama Administration’s Cyberspace Policy Review...
August 11, 2011 Added by:Headlines
Trading on Hong Kong’s stock market, Hong Kong Exchanges and Clearing, remains suspended today following a “coordinated and sustained” distributed denial of service attack on one of the exchange’s websites Wednesday...
August 09, 2011 Added by:Headlines
The cybersecurity executing arm of the UN has endorsed the Global CyberLympics, a new initiative by the EC-Council to foster international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries...
August 08, 2011 Added by:Infosec Island Admin
Receive up to a $500 discount on the Cybersecurity Foundations course offered by Global Knowledge through the ISLAND TRADEWINDS program - Investigate cybersecurity threats and master techniques needed to protect your network...
August 08, 2011 Added by:Headlines
“Cyber threats have taken on a new dimension over the last year, from Wikileaks and Stuxnet to large-scale theft of customer data... Despite new countermeasures, we are not winning the war on cyber crime. We need stronger policies to protect our digital economy..."
July 27, 2011 Added by:Headlines
According to the U.S. Strategic Command, the DOD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DOD and other U.S. government computer networks to further a variety of ideological objectives...
July 21, 2011 Added by:Mike Meikle
Systems and software are designed by humans and there will be flaws that can be exploited. Plus, social engineering will always provide a path to compromising the most secure systems due to the fallibility of the human element. Legislation will not address these factors...
July 21, 2011 Added by:Headlines
“In an era when our nation and its allies are increasingly dependent on the integrity of information and systems supported, transmitted, or stored in cyberspace, it is essential that that space is as resilient and secure as possible," said NSA Deputy Director John C. Inglis...
July 14, 2011 Added by:Javvad Malik
I explained to someone that I worked in infosec, they commented, “there’s not much you guys do given all the hacking that’s gone on lately.” I could have just explained how a lot of the so-called hacking attacks were actually DDOS, or that human error was responsible, but my mind wandered...
July 14, 2011 Added by:Headlines
"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," deputy secretary of defense William Lynn said in a speech at the National Defense University at Fort McNair...
July 13, 2011 Added by:Headlines
“As our lives, jobs and society are increasingly reliant on Internet services, we need to proactively address the issues and practices raised from the convergence of mobile, cloud and social media. User trust is proving to be a defining factor of business success, innovation and regulation..."
Wanna Buy Some Dumps?... Biniohs Chekcer on 06-19-2013
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013