Blog Posts Tagged with "Cyber Security"
March 31, 2011 Added by:Don Eijndhoven
For now, very few experts take these measures seriously and fear that our National cyber defense posture will be weakened rather than strengthened. Let´s hope that this is not the case, because various research papers already point to The Netherlands as a haven for malware...
March 21, 2011 Added by:J. Oquendo
McAfee is making a run to become the security industry's "Minitru". Regardless of my view of the security landscape, I believe that there is an increasing need to share information between companies that are under attack or that have been compromised. However, I doubt this could ever happen...
March 21, 2011 Added by:Headlines
Situational awareness is vital to securing global cyber systems and ensuring national security. Policies that enable companies and governments to work together by using global threat intelligence to enhance correlation and predictive capabilities are critical to real-time responsiveness...
March 14, 2011 Added by:Jon Stout
Risk to federal cyber security introduced by an emerging technology is inversely proportional to the convenience it offers. Every few years a hot capability comes along that instantly has businesses clamoring to adopt it, while security professionals scramble to address its vulnerabilities...
March 11, 2011 Added by:Headlines
Senator Sheldon Whitehouse is turning up the heat on the Obama administration to follow through on a comprehensive federal cyber security overhaul. During a Senate hearing this week, Whitehouse pressed Homeland Security Secretary Janet Napolitano for updates on the administration's position...
March 07, 2011 Added by:Marjorie Morgan
"When it comes to enhancing our nation’s cyber security we understand that the devil is in the details. That’s why we have worked over the past six months to hammer out very specific policy positions... in a way that protects our national security, our economy and our civil liberties..."
February 23, 2011 Added by:Dan Dieterle
In normal operation, the BGP protocol helps keep the internet up and running. If a router goes down, Routers update the missing link and go around it. But if these routers are attacked on purpose and flooded with updates, it could put the internet into a state where it could not recover...
February 21, 2011 Added by:Robert Siciliano
Corporations and government agencies are legally required to secure their systems. But no such standards exist for the consumer. No laws require you to take a single step for the sake of your own security. Software vendors should certainly be held accountable if their products aren’t secure...
February 17, 2011 Added by:Mike Meikle
One of the biggest problems we face as security professionals is information overload. Our inboxes look like the warehouse from Raiders of the Lost Ark, Twitter releases a fire hose of information in our faces and then we have a stack of print publications teetering in the corner...
February 16, 2011 Added by:Dan Dieterle
"The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a collaborative state and local government-focused cyber security entity that is significantly enhancing cyber threat prevention, protection, and response and recovery throughout the states of our nation..."
February 11, 2011 Added by:Headlines
"We can continue to pursue outdated strategies and spend our time describing the problem until there is some crisis. Then it is likely that the United States will act, in haste, possibly with unfortunate consequences. Alternatively, we can take action on measurably effective policies...."
February 10, 2011 Added by:Headlines
"Cyber-threats are not on the horizon, they are upon us. Businesses and investors must trust that their investments are secure. We cannot allow security breaches to undermine our trust in the U.S. economy," said Senator Menendez...
February 08, 2011 Added by:Bill Gerneglia
The average cost of cyber attack declined significantly last year, but survey sponsors said the finding might be misleading. A spokesman for the company that paid for the study said that could be due to organizations reclassifying losses as related to privacy and fraud rather than cyber security...
February 07, 2011 Added by:Headlines
DARPA is seeking to spur cyber security innovation from smaller, private cooperatives commonly known as the hacker community. The Cyber Fast Track program will support the development of unconventional solutions that can be created over short intervals by low budget operations...
February 07, 2011 Added by:Headlines
The Department of Defense is considering options to create a computer network monitoring database in an effort to better identify and respond to cyber threats. The main benefit of the shared information database would be to allow the government to respond to cyber threats in a more unified manner...
February 02, 2011 Added by:Marjorie Morgan
Larry Clinton will be featured on a Federal News Radio panel that will discuss Advanced Persistent Threats and the industrial strength hacking. The discussion will explore how the threat has evolved, the implications are for business, government officials, society, and the growing challenge...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013