Items Tagged with "Cyber Security"
April 18, 2011 Added by:Headlines
This is NOT a government-mandated, national ID program; in fact, it's not an identity 'program' at all. This is a call by the administration to the private sector to step up, take leadership of this effort and provide the innovation to implement a privacy-enhancing, trusted system...
April 14, 2011 Added by:Marjorie Morgan
Economics are driving both industry and government to adopt increasingly sophisticated technologies which raise serious new security issues. It is simply dangerous to suggest that the problems can be managed with a set of government determined technical standards...
April 14, 2011 Added by:Headlines
"I don't want to tell you that the sky is falling... But I'm telling you that the threat environment is significant, and it is not possible for anyone to stay completely secure. It's just too hard, even for the most concerned agencies or private-sector entities..."
April 12, 2011 Added by:Carter Schoenberg
Americans maintain a culture of “get it done in two weeks or it has no value”. Odd that its not training, not more ammunition (antivirus), not better firearms (IDS/IPS), but a change in our culture regarding security and technology that will save us from our own cone of destruction...
April 08, 2011 Added by:Wayde York
Threats that exploit our systems and target specific information work in the background in a "low and slow" method, and finding them in the din of normal network traffic is difficult. If the shutdown does occur, the layers of noise that protects these threats will be pulled back...
April 07, 2011 Added by:Headlines
"When we put ourselves in state of chaos like this, and this is what it will be, think of the opportunities for striking through the APTs (advanced persistent threats), they can pick and choose the targets with much less security behind them..."
March 31, 2011 Added by:Don Eijndhoven
For now, very few experts take these measures seriously and fear that our National cyber defense posture will be weakened rather than strengthened. Let´s hope that this is not the case, because various research papers already point to The Netherlands as a haven for malware...
March 21, 2011 Added by:J. Oquendo
McAfee is making a run to become the security industry's "Minitru". Regardless of my view of the security landscape, I believe that there is an increasing need to share information between companies that are under attack or that have been compromised. However, I doubt this could ever happen...
March 21, 2011 Added by:Headlines
Situational awareness is vital to securing global cyber systems and ensuring national security. Policies that enable companies and governments to work together by using global threat intelligence to enhance correlation and predictive capabilities are critical to real-time responsiveness...
March 14, 2011 Added by:Jon Stout
Risk to federal cyber security introduced by an emerging technology is inversely proportional to the convenience it offers. Every few years a hot capability comes along that instantly has businesses clamoring to adopt it, while security professionals scramble to address its vulnerabilities...
March 11, 2011 Added by:Headlines
Senator Sheldon Whitehouse is turning up the heat on the Obama administration to follow through on a comprehensive federal cyber security overhaul. During a Senate hearing this week, Whitehouse pressed Homeland Security Secretary Janet Napolitano for updates on the administration's position...
March 07, 2011 Added by:Marjorie Morgan
"When it comes to enhancing our nation’s cyber security we understand that the devil is in the details. That’s why we have worked over the past six months to hammer out very specific policy positions... in a way that protects our national security, our economy and our civil liberties..."
February 23, 2011 Added by:Dan Dieterle
In normal operation, the BGP protocol helps keep the internet up and running. If a router goes down, Routers update the missing link and go around it. But if these routers are attacked on purpose and flooded with updates, it could put the internet into a state where it could not recover...
February 21, 2011 Added by:Robert Siciliano
Corporations and government agencies are legally required to secure their systems. But no such standards exist for the consumer. No laws require you to take a single step for the sake of your own security. Software vendors should certainly be held accountable if their products aren’t secure...
February 17, 2011 Added by:Mike Meikle
One of the biggest problems we face as security professionals is information overload. Our inboxes look like the warehouse from Raiders of the Lost Ark, Twitter releases a fire hose of information in our faces and then we have a stack of print publications teetering in the corner...
February 16, 2011 Added by:Dan Dieterle
"The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a collaborative state and local government-focused cyber security entity that is significantly enhancing cyber threat prevention, protection, and response and recovery throughout the states of our nation..."