September 01, 2011 Added by:Headlines
Hurtado accessed U.S. Bank’s computer system and changed the contact information for the accounts of two elderly customers at the bank. After changing their contact information, Hurtado then allegedly closed these accounts and took out cashier’s checks for the balance of each account...
August 31, 2011 Added by:Kevin L. Jackson
FedPlatform.org has been formed as a collaborative initiative to help federal organizations safely learn about and evaluate PaaS technologies. The initiative supports the Federal Cloud Computing Strategy and the Federal CIO’s 25-Point Federal IT Reform Plan...
August 25, 2011 Added by:Headlines
The DHS's National Cybersecurity and Communications Integration Center (NCCIC) is warning that malicious users may seek to exploit interest related to physical events such as earthquakes and hurricanes by generating phishing emails with subject lines related to the incidents...
August 25, 2011 Added by:Headlines
Friday, August 26, 2011 from 12:00 p.m. – 1:00 p.m. EDT: The purpose of the call is to update partners on DHS IP Hurricane Irene planning and preparation activities, procedures, and capabilities should the hurricane make landfall and significantly impact critical infrastructure operations...
August 23, 2011 Added by:Chris Blask
The rather petulant tone of the advisory indicates problems with the way our system is setup as well as insufficient process and staffing being applied to outbound communications. Certainly, advisories with content and tone like this one are not a step in the right direction...
August 15, 2011 Added by:Dan Dieterle
Congress has created a requirement that 1/3 of ALL military ground vehicles be automated or unmanned by 2015. Are automated systems susceptible to malfunctions, glitches or software errors? Are there any instances of these systems turning on their creator? Unfortunately, yes...
August 12, 2011 Added by:Bill Gerneglia
The White House has named a new Chief Information Officer to succeed Vivek Kundra. Former Microsoft executive Steven VanRoekel, an Obama supporter who attended the inauguration, will become the next Chief Information Officer of the federal government...
July 20, 2011 Added by:Marjorie Morgan
Speaker of the House Boehner has appointed a task force comprised of Members from the major Committees of the House to develop a framework for cyber security legislation. The ISA was the very first organization that was asked to testify before the Task Force...
July 14, 2011 Added by:Headlines
"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," deputy secretary of defense William Lynn said in a speech at the National Defense University at Fort McNair...
July 14, 2011 Added by:Scot Terban
While the site is registered in the US, the actual servers are all located in Malaysia. So, once again we see that Malaysia seems to be a hub where the Internet Jihad is concerned. I have to wonder just how well our government gets along with the Malay government...
July 05, 2011 Added by:Danny Lieberman
If we consider that cyber terror is not fundamentally different than bombers with suicide belts, we are drawn to consider the amount of damage caused by any terror attack whether on the street or in a database. Reducing the probability of attack means reducing the threat surface...
July 04, 2011 Added by:Don Eijndhoven
Though it is positive that the Cyber Security Council was made operational so quick, it is sad that the Dutch government did not provide a course for others to participate. Obviously the first batch of members have been hand-picked - it could hardly be called a democratic process...
June 22, 2011 Added by:Jay Bavisi
We need to identify what is a best practice using currently available standards, and build a framework that allows us to follow this “code of conduct” in an automated way that provides a continuous flow of security, and can pinpoint failures in our security policies in real time...
June 21, 2011 Added by:Lee Munson
So where is a good place where you can not only gain experience with the latest machines but also have to protect important data from attackers around the world? Working for the government...
May 31, 2011 Added by:Scot Terban
You have the right to privacy in your papers and your domicile, but does this actually apply to digital papers, computers, hard drives, and anything you pass over telco lines to the cloud? Or is it considered public domain like your trash being placed at the end of your driveway?
May 22, 2011 Added by:David Navetta
The rapid growth of mobile products and services raises several concerns: mobile devices are always on and always with the consumer, mobile devices contain information that is highly personal in nature, and companies have the ability to track consumers who use mobile devices...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013