Blog Posts Tagged with "DHS"
September 10, 2012 Added by:Electronic Frontier Foundation
After a year control over dajaz1.com was handed back to the owners with no apology and no explanation. It is disturbing enough that DHS has been acting as the tax-funded hired gun of the content industry, but, even more horrifying it censored the wrong targets for no good reason...
August 29, 2012 Added by:Infosec Island Admin
It only takes a single infected computer to potentially infect thousands of others. Partnerships are required across all levels of government, the private sector and internationally to share information about emerging threats and how to stop them, and coordinate mitigation efforts in response to cyber incidents...
July 19, 2012 Added by:Infosec Island Admin
Hackers frequently take advantage of highly-publicized events and popular news to get users to click on fraudulent links and unknowingly download malware onto their computers, smart phones, tablets, and other wireless devices. To avoid these online scams, it's important to follow these practices...
July 12, 2012 Added by:Infosec Island Admin
ICS and the smart grids are two of these priority areas identified by the EU-US WG. In the last decade, these systems have been facing a notable number of incidents, including the manifestation of Stuxnet which raised a lot of concerns and discussions among all the actors involved in the field...
July 11, 2012 Added by:Headlines
"We provide free specialized access to skills and services that are not readily available or are in high demand across the dot-gov to promote a healthy and resilient cyber infrastructure. That's the goal to do risk-based analysis and gap analysis of capabilities and drive improvements..."
July 09, 2012 Added by:Headlines
"These new members of our vast cybersecurity team bring a wide array of experience and skills. Building on the successes of our strong and robust team, we are taking the DHS cybersecurity program to new levels that will ultimately enhance the security and safety of our nation..."
June 22, 2012 Added by:Headlines
The Federal government released The Digital Government Strategy, a 12-month action plan for the deployment of new technology is designed to enable the delivery of digital information and services anytime, anywhere, on any device, safely and securely-throughout the Federal workforce and to the American public...
June 15, 2012 Added by:Headlines
Program graduates often develop into cyber experts who help to protect national-security information systems, commercial networks, and critical information infrastructure in both the private and public sectors – meeting the increasingly urgent needs of the U.S. government, industry, and academia...
June 06, 2012 Added by:Marjorie Morgan
"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...
June 06, 2012 Added by:Headlines
“Today we face an increasing demand for the best and brightest in the cybersecurity field across industry, academia and government. DHS is committed to working with our partners... to develop the next generation of cyber professionals to protect against evolving cyber threats"...
June 06, 2012 Added by:Headlines
The event is organized by the European Commission in co-operation with ENISA and the US Department of Homeland Security. The objective of the event is to bring intermediaries together in order to establish a reinforcing momentum in awareness raising and dissemination effort on topics pertaining to information security...
June 01, 2012 Added by:Headlines
"Results can only be achieved through a commitment of resources by both the public and private sector to aid in the detection, prevention, remediation and recovery from these threats and by users adhering to safe computing practices..."
May 18, 2012 Added by:Rafal Los
Here's the problem - when it comes to critical infrastructure protection it's very difficult to legislate and regulate the organizations that matter into a state of better security. The problem is that in order to enforce policy and rules there either have to be consequences to failing, or incentives not to fail - or both...
May 18, 2012 Added by:Headlines
This statement of intent will help enhance situational awareness and information sharing on cybersecurity issues, increase collaboration and sharing of cybersecurity best practices, and create opportunities for training and cooperation in cyber exercises...
May 17, 2012 Added by:Joel Harding
US cyber defenses will now include more than just the US Cyber Command and the Department of Homeland Security. Eventually it may include somewhere around 8,000 contractors, mostly defense contractors. Of course the conspiracy theorists will begin screaming “big brother”...
May 09, 2012 Added by:Headlines
Please act now. The clean servers maintained by the private sector in coordination with the FBI will expire on July 9, 2012. Internet users who have the DNSChanger malware and whose IS) has moved them to one of the clean servers, may not have access to the Internet after this date...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013