Items Tagged with "Cyber Security"


69dafe8b58066478aea48f3d0f384820

US - UK Progress Towards a More Secure Cyberspace

March 15, 2012 Added by:Headlines

"We share an abiding commitment to keeping cyber-criminals from victimizing our citizens and weakening our trust in networked technology. Owing in part to our close partnership, it is harder than ever before for criminals to operate in cyberspace with impunity..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Don't Miss the TECHEXPO Cyber Security Hiring Event

March 13, 2012 Added by:Infosec Island Admin

Are you a Cyber Warrior and seeking a new employment opportunity? Don't miss the TECHEXPO Cyber Security hiring event March 20th. Bring resumes and interview for the many opportunities, and learn from our guest speakers William M. Jimenez, Paul de Souza, and Richard Bejtlich...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CyLab Report: Corporate Boards Neglecting Cyber Security

March 13, 2012 Added by:Headlines

"Less than two-thirds of the Forbes Global 2000 companies surveyed have full-time personnel in key roles responsible for privacy and security in a manner that is consistent with internationally accepted best practices and standards..."

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Shining LIGHTS on ICS Cybersecurity

March 11, 2012 Added by:Chris Blask

The LIGHTS program was created as a means of addressing security for the large number of small utilities operations. LIGHTS is a non-profit program run under Energysec that sets a consistent open-source-baseline approach to securing smaller critical industrial control facilities...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Releases Framework for Smart Grid Standards

March 08, 2012

Cybersecurity is now expanded to address the following: combined power systems, information technology and communication systems in order to maintain the reliability, the physical security of all components, and the reduced impact of coordinated cyber-physical attacks...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cyber Security: The Sky is Falling

February 24, 2012 Added by:J. Oquendo

Common sense dictates that there is a lot of money to be made in "cyberlandia", and someone is going to make it by using any boogeyman available. Cyber is the new Gold Rush, however much of what is being portrayed by the media is blown out of proportion and unrealistic...

Comments  (8)

69dafe8b58066478aea48f3d0f384820

US and Netherlands Expand Cybersecurity Coordination

February 22, 2012 Added by:Headlines

The Letter of Intent recognizes expanded coordination between the US and the Netherlands, and outlines several areas to further collaborate on cybersecurity including incident management and response activities, control systems security, and cybersecurity exercises...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cybersecurity Act of 2012 - Cybersecurity Collides with Risk

February 19, 2012 Added by:Rafal Los

This is just a chance to create some new regulatory-agency office, hire a bunch of new auditors, attorneys, experts, and waste more time rather than actually making critical infrastructure more risk-averse...

Comments  (0)

924ce315203c17e05d9e04b59648a942

In Cyber - Losers Ignore, Survivors React, Winners Predict

February 15, 2012 Added by:Richard Stiennon

Every organization has a choice: become a victim of cyber attack and pay the cost of recovery then rely on quick reactions to changes in the threat space to survive the next attack, or predict the escalation in attacks and invest early in the defenses required...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Comprehensive Cyber Security Act of 2012 Introduced

February 14, 2012

The act was designed to provide the government with a clear structure for securing its own networks and those that run critical infrastructure - energy and water delivery systems, financial systems, nuclear and chemical, plants, and transportation networks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Obama Administration’s Cybersecurity Proposal

February 13, 2012 Added by:Headlines

The President’s proposal would establish national standards, protect federal networks, and allow DHS to provide enhanced voluntary assistance to our private sector and state, local, tribal, and territorial government partners...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Hosts Federal Infosec Educators Conference

February 13, 2012 Added by:Headlines

FISSEA is responsible for promoting cybersecurity awareness, training and education. The annual meeting is geared toward both new and seasoned security officers, IT managers, information security educators and researchers, cybersecurity trainers and teachers...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Bluetooth Security: Be Wary

February 07, 2012 Added by:Theresa Payton

Many of us use and love Bluetooth technology. It’s easy to set up and convenient to use. But you might want to think twice about what you use it for because that easy connection for you can also be an easy connection for a cybercreep...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Strategic Command on Defending Cyberspace

February 07, 2012 Added by:Headlines

DoD networks and personnel are being tested to the very limits of their ability to deflect assault. Attackers all over the world are utilizing every conceivable method to gain access to our critical systems and introduce malicious code to exploit or destroy our assets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Leaders Urge Congress to Act on Cyber Laws

February 06, 2012 Added by:Headlines

Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...

Comments  (0)

39728eff8ac87a48cfb050f0df29ceaa

Who Will Watch the Watchers?

February 05, 2012 Added by:John Linkous

We have entered a new era of cybersecurity, one where the objective is not to protect against a breach - the majority of large organizations are no longer able to - instead we need to be able to detect them and mitigate the damage done by them...

Comments  (0)

Page « < 11 - 12 - 13 - 14 - 15 > »