Blog Posts Tagged with "White House"

03b2ceb73723f8b53cd533e4fba898ee

Chinese cyber attack against the White House

October 02, 2012 Added by:Pierluigi Paganini

The news is circulating on the internet creating great concern once again that Chinese hackers have hit the infrastructure of a foreign state, and once again we are speaking of cyber espionage, but this time they were able to access the White House Military Office...

Comments  (2)

924ce315203c17e05d9e04b59648a942

There is No Need for a Cybersecurity Executive Order

September 11, 2012 Added by:Richard Stiennon

Forcing utility operators, banks, and earth resources companies to comply with frameworks based on outmoded asset and vulnerability methodologies will distract them from implementing threat based defenses. The Executive Order, if issued, will do much more harm than good...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Attorney General Taps Federal Prosecutors for Stuxnet Leak

June 11, 2012 Added by:Headlines

With the appointment of special investigators by Holder, the probe has widened to include the disclosure of the development of the Stuxnet virus, which infected systems that provided operations control for Iranian production networks, and was most likely produced to stifle Iran's nuclear weapons program...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Hosts White House Cyber Jobs Event

June 06, 2012 Added by:Marjorie Morgan

"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Online Trust Alliance Joins White House to Battle Botnets

June 01, 2012 Added by:Headlines

"Results can only be achieved through a commitment of resources by both the public and private sector to aid in the detection, prevention, remediation and recovery from these threats and by users adhering to safe computing practices..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House Announces Initiative to Combat Botnets

May 31, 2012 Added by:Headlines

One in 10 computers in the U.S. is infected by a botnet used and used as a bases to execute criminal or espionage actions on behalf of remote operators Botnets can make private and financial information available to hackers, harm computers, and turn consumers into unwitting disseminators of spam emails...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House Cybersecurity Coordinator Howard Schmidt Resigns

May 17, 2012 Added by:Headlines

"It has been a tremendous honor for me to have served in this role and to have worked with such dedicated and professional colleagues both in the government and private sector. We have made real progress in our efforts to better deal with the risks in cyberspace..."

Comments  (0)

4289a029dd052b867dafc6cdf5bde53b

Procrastination in Cybersecurity Legislation

April 29, 2012 Added by:Michelle Valdez

Congress is procrastinating with regards to cybersecurity legislation. The debates will continue about regulation and authorities and privacy rights but in the end, we all need to come together and find the best way to share threat data so that we can protect critical networks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House: Big Data is a Big Deal

April 05, 2012 Added by:Headlines

By improving our ability to extract knowledge and insights from large and complex collections of digital data, the initiative promises to help accelerate the pace of discovery in science and engineering, strengthen our national security, and transform teaching and learning...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Lawmakers Continue Clash Over Cybersecurity Legislation

March 22, 2012 Added by:Headlines

“It is critical that we strengthen our cybersecurity posture, and we urge Congress to recognize the need for new tools to more effectively prevent and respond to potential cyber attacks on the homeland..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US - UK Progress Towards a More Secure Cyberspace

March 15, 2012 Added by:Headlines

"We share an abiding commitment to keeping cyber-criminals from victimizing our citizens and weakening our trust in networked technology. Owing in part to our close partnership, it is harder than ever before for criminals to operate in cyberspace with impunity..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Unveils Blueprint for Online Privacy Bill of Rights

February 23, 2012 Added by:Headlines

The Obama Administration today unveiled a “Consumer Privacy Bill of Rights” as part of a comprehensive blueprint to improve consumers’ privacy protections and ensure that the Internet remains an engine for innovation and economic growth...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Obama Administration’s Cybersecurity Proposal

February 13, 2012 Added by:Headlines

The President’s proposal would establish national standards, protect federal networks, and allow DHS to provide enhanced voluntary assistance to our private sector and state, local, tribal, and territorial government partners...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Initiative to Protect the Electric Grid from Cyber Threats

January 09, 2012 Added by:Headlines

The project, a White House initiative led by the DOE in partnership with the DHS, will leverage private industry and public sector experts to build on existing cybersecurity strategies to create a more comprehensive and consistent approach to protecting the nation’s energy delivery system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Government Cyber Strategy Directs Billions for R and D

December 19, 2011 Added by:Headlines

"When we look at the plan itself, it represents our visions for the research necessary to develop game changing technologies that can help neutralize today's cyber attacks and build an infrastructure to secure our systems from what may come in the future..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Federal Cyber Security R and D Strategy Released

December 07, 2011 Added by:Headlines

"Sustained efforts in these areas will result in a more secure and trustworthy cyberspace. We invite researchers and innovators in industry and academia to join us in this effort. Together, we can maximize the benefits of research and accelerate their transition into the marketplace..."

Comments  (0)

Page « < 1 - 2 > »