June 17, 2010 Added by:Ron Lepofsky
Last night Pres Obama made a speech to the nation about the BP oil spill. One of his three central points dealt with preventing a future oil spill disaster. Today the President told BP to allocate billions of dollars to reimburse those who suffered as the result of BP’s oil spill. Perhaps now is the time to take similar action and allocate funds and sticks to pr...
June 15, 2010 Added by:Marjorie Morgan
Internet Security Alliance President Larry Clinton and ISA Board Member, Jeff Brown, Raytheon, Director of Infrastructure Services and Chief Information Security Officer will take part in a forethcoming Congressional Cybersecurity Caucus Event.
June 13, 2010 Added by:Anthony M. Freed
In continued efforts to centralize the cybersecurity authority within the White House, more than 40 bills have been introduced that will dramatically alter the balance of power between the government and the private sector. Protecting Cyberspace as a National Asset Act of 2010 will shift the responsibility of federal agency cybersecurity from the Office of Management and Budget (OMB) to DHS by cre...
May 13, 2010 Added by:Dario Forte
After Viagra, guns and fake medicines, now we can purchase contraband cigarettes online. But the police are always on the alert. Here we discuss a recent Italian case. The Italian Guardia di Finanza (Finance Police) recently completed a longstanding investigation of a criminal organization specialized in Internet sales of tobacco products processed outside of Italy.
April 29, 2010 Added by:Richard Stiennon
Today’s hearing on the nominations of Keith Alexander to head CYBERCOM (and Admiral Winnfield to head NORAD and NORTHCOM) were the first time that operational responsibilities of CYBERCOM have been discussed in a public forum.
April 27, 2010 Added by:Roman Zeltser
The terms "cyber terrorism" or "information warfare" are derived from political agendas of those who rule the countries or from global conglomerates and large corporations that don't hesitate to use any possible measures to achieve their goal. The information age gave us not only sophisticated computer equipment, software, and gadgets but also something that many of u...
April 08, 2010 Added by:Marjorie Morgan
On Wednesday, March 24, the Senate Commerce Committee became the first Congressional Committee to approve a comprehensive cybersecurity bill. The "kill-switch" provision (turning off the Internet) and federally mandated technical standards on the private sector have been eliminated from earlier versions of the legislation and the bill now embraces private sector standards and market incentiv...
April 08, 2010 Added by:Richard Stiennon
Senators Rockefeller and Snowe have formulated a new Cybersecurity bill that they describe in today’s Wall Street Journal. (Use Google news to get to the full article.) The Bill as proposed will be very disruptive to the operations of every business and will do essentially nothing to prepare the US for cyberwar.
March 25, 2010 Added by:Danny Lieberman
The GRC (governance, risk and compliance) market is driven by three factors: government regulation such as Sarbanes-Oxley, industry compliance such as PCI DSS 1.2 and growing numbers of data security breaches and Internet acceptable usage violations in the workplace. $14BN a year is spent in the US alone on corporate-governance-related IT spending .
March 24, 2010 Added by:Jenni Hesterman
Most would agree that globalization, fed by technological advances in the information system and telecommunications realms, has overwhelmingly been a "good thing". Our world is connected like never before, and those formerly isolated are now part of the landscape, able to access critical medical information, tap educational resources and answer almost any question in two clicks.
March 23, 2010 Added by:Anthony M. Freed
I recently had the pleasure of making the acquaintance of the illustrious Theresa Payton, who's long and vibrant career has spanned multiple industry sectors and government service at the highest levels.
From the Web
March 01, 2010 from: Saumil's Infosec Blog
The U.S. Department of Defense (DoD) announces the official approval of the EC-Council Certified Ethical Hacker (CEH) certification program as a new baseline skills requirement for U.S.cyber defenders. Specifically, the new Certified Ethical Hacker program is required for the DoD's computer network defenders (CND's), a specialized personnel classification within the DoD's information assurance wor...
From the Web
February 09, 2010 from: Saumil's Infosec Blog
What is believed to be the country's biggest hacker training site has been shut down by police in Central China's Hubei province. Three people were also arrested, local media reported yesterday. The three, who ran Black Hawk Safety Net, are suspected of offering others online attacking programs and software, a crime recently added to the Criminal Law. A total of 1.7 million yuan ($249,000) in asse...
From the Web
February 08, 2010 from: Saumil's Infosec Blog
“Carry out all my demands or the entire country’s electricity will be cut off.” Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? “Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom,” says Dr. Yaniv Levyatan, an expert in information war at the Uni...
February 02, 2010 Added by:Tom Schram
In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write: “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...
January 27, 2010 Added by:Anthony M. Freed
Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question: Where do cyber vigilantes fall on the infosec ethics spectrum?
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013