Blog Posts Tagged with "White House"
October 02, 2012 Added by:Pierluigi Paganini
The news is circulating on the internet creating great concern once again that Chinese hackers have hit the infrastructure of a foreign state, and once again we are speaking of cyber espionage, but this time they were able to access the White House Military Office...
September 11, 2012 Added by:Richard Stiennon
Forcing utility operators, banks, and earth resources companies to comply with frameworks based on outmoded asset and vulnerability methodologies will distract them from implementing threat based defenses. The Executive Order, if issued, will do much more harm than good...
June 11, 2012 Added by:Headlines
With the appointment of special investigators by Holder, the probe has widened to include the disclosure of the development of the Stuxnet virus, which infected systems that provided operations control for Iranian production networks, and was most likely produced to stifle Iran's nuclear weapons program...
June 06, 2012 Added by:Marjorie Morgan
"Most cyber breaches are not conducted by hackers from the outside but poorly trained or rogue insiders. The primary vulnerability in the cyber system is the people. Unless we find a way to spur the market to create a cyber secure workforce we risk unilaterally disarming both our economy and our national defense"...
June 01, 2012 Added by:Headlines
"Results can only be achieved through a commitment of resources by both the public and private sector to aid in the detection, prevention, remediation and recovery from these threats and by users adhering to safe computing practices..."
May 31, 2012 Added by:Headlines
One in 10 computers in the U.S. is infected by a botnet used and used as a bases to execute criminal or espionage actions on behalf of remote operators Botnets can make private and financial information available to hackers, harm computers, and turn consumers into unwitting disseminators of spam emails...
May 17, 2012 Added by:Headlines
"It has been a tremendous honor for me to have served in this role and to have worked with such dedicated and professional colleagues both in the government and private sector. We have made real progress in our efforts to better deal with the risks in cyberspace..."
April 29, 2012 Added by:Michelle Valdez
Congress is procrastinating with regards to cybersecurity legislation. The debates will continue about regulation and authorities and privacy rights but in the end, we all need to come together and find the best way to share threat data so that we can protect critical networks...
April 05, 2012 Added by:Headlines
By improving our ability to extract knowledge and insights from large and complex collections of digital data, the initiative promises to help accelerate the pace of discovery in science and engineering, strengthen our national security, and transform teaching and learning...
March 22, 2012 Added by:Headlines
“It is critical that we strengthen our cybersecurity posture, and we urge Congress to recognize the need for new tools to more effectively prevent and respond to potential cyber attacks on the homeland..."
March 15, 2012 Added by:Headlines
"We share an abiding commitment to keeping cyber-criminals from victimizing our citizens and weakening our trust in networked technology. Owing in part to our close partnership, it is harder than ever before for criminals to operate in cyberspace with impunity..."
February 23, 2012 Added by:Headlines
The Obama Administration today unveiled a “Consumer Privacy Bill of Rights” as part of a comprehensive blueprint to improve consumers’ privacy protections and ensure that the Internet remains an engine for innovation and economic growth...
February 13, 2012 Added by:Headlines
The President’s proposal would establish national standards, protect federal networks, and allow DHS to provide enhanced voluntary assistance to our private sector and state, local, tribal, and territorial government partners...
January 09, 2012 Added by:Headlines
The project, a White House initiative led by the DOE in partnership with the DHS, will leverage private industry and public sector experts to build on existing cybersecurity strategies to create a more comprehensive and consistent approach to protecting the nation’s energy delivery system...
December 19, 2011 Added by:Headlines
"When we look at the plan itself, it represents our visions for the research necessary to develop game changing technologies that can help neutralize today's cyber attacks and build an infrastructure to secure our systems from what may come in the future..."
December 07, 2011 Added by:Headlines
"Sustained efforts in these areas will result in a more secure and trustworthy cyberspace. We invite researchers and innovators in industry and academia to join us in this effort. Together, we can maximize the benefits of research and accelerate their transition into the marketplace..."
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013