Items Tagged with "Cyber Security"


3e35900ae6facc6c146a85c435c71d82

Cyber Attacks: Protecting National Infrastructure

July 15, 2012 Added by:Ben Rothke

Protecting “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters”...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Cybersecurity, Scare Tactics, and Sacrificing Privacy

July 13, 2012 Added by:Electronic Frontier Foundation

Efforts to break the partisan stalemate over the Cybersecurity Act, a bill that would allow Internet companies to monitor the communications of users and pass that data to the government without any judicial oversight, have backers of the bill attempting to drum up fears about catastrophic cyberattacks...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

EU-US Workshop on Cyber Security of ICS and Smart Grids

July 12, 2012 Added by:Infosec Island Admin

ICS and the smart grids are two of these priority areas identified by the EU-US WG. In the last decade, these systems have been facing a notable number of incidents, including the manifestation of Stuxnet which raised a lot of concerns and discussions among all the actors involved in the field...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Cyber Teams Uncover Federal Network Vulnerabilities

July 11, 2012 Added by:Headlines

"We provide free specialized access to skills and services that are not readily available or are in high demand across the dot-gov to promote a healthy and resilient cyber infrastructure. That's the goal to do risk-based analysis and gap analysis of capabilities and drive improvements..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Chief: Cyber Presents Opportunities and Challenges

July 11, 2012 Added by:Headlines

“If the critical infrastructure community is being attacked by something, we need them to tell us at network speed... It requires them - the Internet service provider or that company - to tell us that that type of event is going on at this time. And it has to be at network speed if you’re going to stop it...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Espionage and the Greatest Transfer of Wealth in History

July 10, 2012 Added by:Headlines

"Symantec placed the cost of IP theft to United States companies at $250 billion a year. Global cybercrime at $114 billion - nearly $388 billion when you factor in downtime. And McAfee estimates that $1 trillion was spent globally on remediation. And that's our future disappearing in front of us..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA Report: Ten Smart Grid Security Recommendations

July 10, 2012

By making energy distribution more efficient, smart grids give clear benefits to users, electricity suppliers, grid operators, and society as a whole. At the same time, their dependency on computer networks and Internet makes our society more vulnerable to cyber-attacks, with potentially devastating results...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Department of Homeland Security Enhances Cybersecurity Team

July 09, 2012 Added by:Headlines

"These new members of our vast cybersecurity team bring a wide array of experience and skills. Building on the successes of our strong and robust team, we are taking the DHS cybersecurity program to new levels that will ultimately enhance the security and safety of our nation..."

Comments  (0)

2dc39ef06d1ad53bea80d28b84f3aa7e

Cloud Coverage: Malware as a Service

July 04, 2012 Added by:Gregory Hale

The cloud-based control panel uses the secure HTTPS protocol and has a valid certificate. The customer has access to tutorials and a malware engine that generates customized Trojans in real-time. The team behind the service makes sure the created Trojans have a low rate of detection by major antivirus products...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Electricity Subsector Cybersecurity Capabilities Maturity Model

July 03, 2012

The goal of the Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) is to support ongoing development and measurement of cybersecurity capabilities within the electricity subsector. The model was developed to apply to all electric utilities, regardless of ownership structure, size, or function...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Small Business Cyber Security: An Infographic

July 02, 2012 Added by:Fergal Glynn

Businesses often assume they are safe from cyber attacks because they are too small to be of interest to hackers, or mistakenly assume they have taken adequate measures to protect themselves. This infographic highlights the risks faced by small businesses and gives a few tips to help safeguard against attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ENISA Report Calls for Kick-Start in Cyber Insurance Market

June 29, 2012

The report, ‘Incentives and barriers to the cyber insurance market in Europe,’ highlights the fact that while cyber security is an important concern for policy makers, businesses and citizens, traditional coverage offered by insurance providers may not comprehensively address digital risk...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Are Enterprises Really Hacking the Hackers?

June 27, 2012 Added by:Rafal Los

Active defense is using technology which can confuse an attacker, mislead them into spending time on worthless parts of an application, or slowing the response rate of the network or application down. That's active defense. Striking back involves actually going on the offensive, which is likely highly illegal...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

ENISA: Getting Ready for Cyber Europe 2012

June 27, 2012 Added by:Headlines

Cyber Europe 2012 is the 2nd pan-European exercise on Critical Information Infrastructure Protection. It ties together the extensive activities in the EU, at both national and European level, to improve the resilience of critical information infrastructures. The exercise will take place in the autumn...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MI5 Chief: Cyber Espionage Threat on an "Industrial Scale"

June 26, 2012 Added by:Headlines

"Britain’s National Security Strategy makes it clear that cyber security ranks alongside terrorism as one of the four key security challenges facing the UK. Vulnerabilities in the internet are being exploited aggressively not just by criminals but also by states. And the extent of what is going on is astonishing..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Control System Internet Accessibility

June 25, 2012 Added by:Infosec Island Admin

ICS-CERT is tracking and has responded to multiple reports of researchers using SHODAN, Every Routable IP Project (ERIPP), Google, and other search engines to discover Internet facing control systems. ICS-CERT has identified system owners and operators to notify them of their potential vulnerability...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »