Blog Posts Tagged with "Cyber Security"
August 02, 2012 Added by:Bill Mathews
General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?
August 01, 2012 Added by:Electronic Frontier Foundation
Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...
July 24, 2012 Added by:Electronic Frontier Foundation
We remain unpersuaded that any of the proposed cybersecurity measures are necessary and we still have concerns about certain sections of the bill, especially the sections on monitoring and countermeasures. But this was a big step in the direction of protecting online rights...
July 23, 2012 Added by:Bob Radvanovsky
I am quickly growing weary of the fact that individuals claiming to be "cybersecurity" or "critical infrastructure" subject-matter experts (or "SMEs"), are indicating that adherence to a regulatory requirement or compliance governance means that something is "secured". Let's get one thing straight...
July 23, 2012 Added by:Infosec Island Admin
The NATO Cooperative Cyber Defence Centre of Excellence has developed an online Cyber Defence Awareness course that aims to enhance the general user’s awareness of cyber security risks and measures to mitigate those risks. The course may be accessed through the NATO Joint Advanced Distributed Learning portal...
July 20, 2012 Added by:Stefano Mele
"There appears to have been some progress on developing cyber capabilities. However, cyber security is a fast-paced field and delays in developing our capabilities give our enemies the advantage. We are therefore concerned that much of the work to protect UK interests in cyberspace is still at an early stage..."
July 20, 2012 Added by:Headlines
"These certificates protect access to control systems. They protect access to a $400 billion market. They protect access to trading systems. They also protect access to machines that do things like turn generators off. If you issue a fraudulent certificate or you're lax... the consequences could be disastrous..."
July 19, 2012 Added by:Headlines
“The new Cybersecurity Self-Evaluation Survey Tool for utilities is vitally important in today’s environment where new cyber threats continue to emerge. Adoption by the electric sector will further protect critical infrastructure and... provide an invaluable view of the industry’s cybersecurity capabilities.”
July 18, 2012 Added by:Matthijs R. Koot
The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...
July 17, 2012 Added by:Ali-Reza Anghaie
The annual "Hire a Hacker!" cry from someone affiliated w/ the Pentagon took a new turn this year with the additional suggestion such hirings would have ended the War on Terror long ago. I'm not here to say don't hire the (alleged) criminal element, however, there are some things I want people to ponder...
July 17, 2012 Added by:Headlines
The 67th Network Warfare Wing is the Air Force's premier tactical cyber warfighting organization defending the Air Force network, transforming network operations, and providing full-spectrum capabilities across the Air Force enterprise and to U.S. Cyber Command and the Combatant Commanders...
July 15, 2012 Added by:Ben Rothke
Protecting “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters”...
July 13, 2012 Added by:Electronic Frontier Foundation
Efforts to break the partisan stalemate over the Cybersecurity Act, a bill that would allow Internet companies to monitor the communications of users and pass that data to the government without any judicial oversight, have backers of the bill attempting to drum up fears about catastrophic cyberattacks...
July 12, 2012 Added by:Infosec Island Admin
ICS and the smart grids are two of these priority areas identified by the EU-US WG. In the last decade, these systems have been facing a notable number of incidents, including the manifestation of Stuxnet which raised a lot of concerns and discussions among all the actors involved in the field...
July 11, 2012 Added by:Headlines
"We provide free specialized access to skills and services that are not readily available or are in high demand across the dot-gov to promote a healthy and resilient cyber infrastructure. That's the goal to do risk-based analysis and gap analysis of capabilities and drive improvements..."
July 11, 2012 Added by:Headlines
“If the critical infrastructure community is being attacked by something, we need them to tell us at network speed... It requires them - the Internet service provider or that company - to tell us that that type of event is going on at this time. And it has to be at network speed if you’re going to stop it...”
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013