Cyber Security Is Ready to Explode


Cyber Security Is Ready to Explode
DailyFinance
So why have McAfee and its main rival Symantec (NAS: SYMC) , along with other top-five cyber security companies, fallen from a 60% share of the market in 2006 to only 44% in 2010? And why have Symantec's sales declined 1.2% between the first and second ...
Oyster Creek gets thumbs up for cyber-security plan
The Star-Ledger - NJ.com
The Oyster Creek nuclear plant got approval for its new cyber-security plan to protect on-site servers against computer hackers and viruses, the Nuclear Regulatory Commission said today. "In a facility like a nuclear power plant, so much is operated ...
Bono Mack Asks for McAfee Briefing as Rivals Question Cybersecurity Report
National Journal
By Josh Smith Rep. Mary Bono Mack, R-Calif., seeks national standards for protecting and responding to computer breaches involving the loss of personal data. Rep. Mary Bono Mack, R-Calif., wants more details from McAfee on the company's recent ...
Cybersecurity Malaysia Introduces New Information Security Guidelines For SME
Bernama
KUALA LUMPUR, Aug 11 (Bernama) -- CyberSecurity Malaysia, an agency under the Ministry of Science, Technology and Innovation (MOSTI), has come up with a set of guidelines entitled "Information Security Guidelines for Small and Medium Enterprises ...
GAO Report Examines State Department Cybersecurity Risk Software
Security Management
By Carlton New software being used by the State Department to assess security weaknesses is helping improve real-time awareness of vulnerabilities, according to a Government Accountability Office report on information security. “Cyber-based threats to ...
Tibco Software Releases Cyber Security Platform
TMC Net
Aug 11, 2011 (Close-Up Media via COMTEX) -- Tibco Software announced a new security offering dubbed Tibco CyberSecurity Platform that can monitor digital infrastructures and critical information systems to anticipate and help prevent new threats before ...
Transparent cybersecurity
Plant Services
If these goals are met, you're well on your way to effective cybersecurity. Gerdau Ameristeel (www.gerdauameristeel.com), a mini-mill steel producer and steel recycler in North America with an annual manufacturing capacity of more than 10 million ..
Creating Ag Extension Agent for Cyber
GovInfoSecurity.com
Eugene Spafford thinks America needs the cybersecurity equivalent of an agriculture extension service to help educate citizens on IT security. Spafford, executive director of Purdue University's Center for Education and Research in Information ...
The danger of misconstruing the most serious security threats
FCW.com
By John Zyskowski Unlike in politics, it's rather important in the world of cybersecurity that words and labels mean something specific. Routinely mislabeling hacking and other incidents of computer mischief could lead to overreactions to ...
Subject Matter: New leader at the helm of AACC CyberCenter
Annapolis Capital
Kip Kunsman will oversee educational contracts for cybersecurity courses and training at AACC. He was the director at the college's Center for Workforce Solutions and has served on the Governor's Workforce Investment Board. "His extensive experience in ...
Multi-State ISAC Conducts Annual Meeting
DigitalJournal.com (press release)
... Acting Assistant Secretary of the DHS Office of Cybersecurity and Communications; Lee Rock, Acting Director of US-CERT; and Kelvin Coleman, Director of State, Local and Tribal Engagement with the DHS National Cyber Security Division. ...
What is the Government's Strategy for the Cyber-exploitation Threat?
Lawfare (blog)
by Jack Goldsmith Cybersecurity studies distinguish between a cyber-attack, which alters, degrades, or destroys adversary computer systems or the information in or transiting through those systems, and cyber-expolitation, which involves no disruption ...
A Model Cyber Warfare School
Korea IT Times (press release)
Last month, Korea University obtained a permission to establish the Department of Cyber Security. This department will receive thirty students a year, offering a full-time scholarship. The graduates will serve in the army as officers but military ...
GovWin Recon: Aug. 11: DOD Budget Impacts on Contractors; Procurement Work ...
govWin (blog)
Anatomy of a cyberattack [Financial Times] - Nick Percoco, the leader of TrustWave's SpiderLabs Research cybersecurity team, gives details of how he helped a defense contractor customer who experienced a cyberattack. He feels the intricacy in the ...
Business RadioX Host Dr. Tim Morrison Interviews Gregory Evans, Notorious ...
DigitalJournal.com (press release)
Evans is a widely renowned cyber-security expert and author of eight books on high-tech security issues, but his now glowing reputation had an inauspicious start. In 1996 he was on the FBI's top ten list of “wanted” computer hackers. ...
The Circuit: AT&T/T-Mobile merger, Verizon strike, spectrum may be a debt panel
Washington Post (blog)
ANA's General Counsel, Doug Wood of Reed Smith, also chimed in, saying, “ANA has raised real concerns regarding economic losses, brand dilution and resultant privacy/cyber-security harms,” and adding that ICANN should return to the negotiating table. ..
Greylock Partners Helps Its Start-Ups Learn 'Data Jujitsu'
Wall Street Journal (blog)
That has caused venture investors to jump on board, as VentureWire previously reported, in areas like cybersecurity and databases, not to mention social media, retail and health care. The enormous growth of data, and the ability to process it, ...
Regis University Utilizes Brivo Access Technology Both in the Classroom and ...
DigitalJournal.com (press release)
Brivo Systems LLC, leader in Software as a Service applications for security management, today announced that Regis University, Denver, Colorado, has deployed Brivo's ACS WebService for managing security at its new CyberSecurity Education Center at the ...
ValidSoft Technology Can Prevent Cybercriminals From Cashing In on Their ...
TMC Net
... judiciary subcommittees in both the US House and Senate have held hearings this year with an eye to finding solutions to cybersecurity and privacy protection. See: http://judiciary.house.gov/hearings/printers/112th/112-38_66541...
Rapid Fire: 2011-08-11
Defense Industry Daily
US debt reduction policies may also prompt European defense contractors to continue their expansion into military technologies deemed safe from spending cuts, as well as cyber-security and energy industry opportunities. EADS' first quarter results for ..
IT backbone of govt a sitting duck for China?
Times of India
Although the company did not identify the state actor in question, Indian cyber security analysts do not hesitate to name China as the principal perpetrator. So although its one entity, it's the host network for the entire Indian government. ...
China Says India and US Primary Culprits in Recent Cyber Attacks
2point6billion
Interestingly enough, the release of China's recent report came only days after US cyber securitycompany McAfee released a report uncovering the largest series of cyber-attacks caused by a “state actor” which, according to many cyber security experts, ...
In light of budget cuts, defense contractors could face ratings downgrade
Bizjournals.com (blog)
However, the projections weren't all bad: the report also indicated spending in the fields of cybersecurity and unmanned aviation would likely escape being whittled down and could even increase.
Irving Burton Associates to Participate as Subcontractor to CCSi
ExecutiveBiz (blog)
The five-year multiple award will cover information technology and telecommunications services, program management, strategy planning, cybersecurity, training, and systems and software engineering. “Just as we have supported our active duty members and ...
Counterfeit IT might face new regulatory actions
FierceGovernmentIT
Federal officials have also expressed worries that counterfeit goods could cause cybersecurity problems, were they to contain malicious firmware. In June 2010, the White House called, in a strategic plan (.pdf) on intellectual property enforcement, ..
BAE May Make Purchases as U.S. Cuts Spur Defense Companies to Widen Reach
Bloomberg
Fareham, England-based Chemring is looking at a single purchase of about 200 million pounds, it said July 23, while London-based Ultra is budgeting for more than 100 million pounds of acquisitions this year in areas including nuclear and cyber security ...
Vulnerable Insulin Pumps Demostrate Pervasive Risks
Network World
In the current economic slide, cyber security isn't a hot issue at the ballot box so don't expect anything but lip service from Washington. The only way we can force industry to deliver secure products is by a collective change in market behavior. 
New CEO for Naval Institute
Annapolis Capital
Among other issues facing the Navy is continued investment in cybersecurity measures despite future spending cuts. As with fighting terrorism, modern warfare involves smaller, more fragmented targets. "We consider it a battlefield," Daly said. ...
Department of Telecom monitoring social networking sites - Facebook, Twitter ...
Times of Assam
This was done to ensure that cyber security is strengthened and all data in social networking sites accessible to the intelligence agencies. This step by the ministry though being welcomed by many is set for some criticism. Two reasons why this might...
Trying to Determine Which Anonymous to Believe
GovInfoSecurity.com
I've long maintained to get people to pay attention to IT security - whether it's pushing Congress to enact needed cybersecurity legislation or improving their own online hygiene - Facebook would have to be breached and taken offline for a period of ...
Hard-won wisdom for smart meter installations
Smart Grid News
He has worked with BGE and numerous other utilities on smart meters, smart grid data management, smart grid cyber security and other important initiatives. Jessica and Shanu put their heads together to come up with a top 10 list of major AMI challenges..
Is 0$gUll45i9 unhackable? Turns out long, common-word passwords are safer
Globe and Mail
A CNN report from the recent Black Hat cybersecurity conference in Las Vegas suggests virtually any password made up of 4 numeric characters could be hacked in 18 minutes using a common type of attack called “brute force.” Basically, the strategy runs ...
BlackBerry helps Britain's rioters organise
AFP
That's why they've been preferring to use it," said Alastair Paterson, chief executive of cybersecurity firm Digital Shadows. He said social media had proved "a very efficient tool for communicating, being able to effectively outwit the police by very ...
Have You Been Hacked This Week?
Wall Street Journal
While it is impossible to verify the full extent to which corporations have been compromised by hacking, a report this month by McAfee, a maker of cybersecurity software, suggests that "every company in every conceivable industry with significant size ...
Visiting Utah, ex-CIA boss lists top US security threats
Salt Lake Tribune
... which Hayden fears could spread to the US, he identified the following as top threats and issues: the war on terror, Iran and its potential to get nuclear weapons, the need to acknowledge China's changing power and cybersecurity...
Fundtech Releases Results of Customer Poll
Banktech
The increased concern about fraud also comes with a belief that cyber security problems aren't being adequately addressed; 66 percent of respondents said that they believe the banking industry will never be able to get cyber crime under control. ...
BION Releases Cloud Security Technology and the Future of Document Tracking ...
Benzinga
This powerful tool has many uses and applications ranging from cyber security to document management, from Sarbanes Oxley Compliance to protecting sensitive information, copyrighted works and more. “It's as if the owner's manual forgot to mention - you ...
Computer Sciences' CEO Discusses Q1 2012 Results - Earnings Call Transcript
Seeking Alpha
These market segments in health, cybersecurity, identity management, data center consolidation and cloud services are continuing to grow at above-market rates, partially offsetting the reductions and pressures in other areas of our US public sector ...
GAO Report Examines State Department Cybersecurity Risk Software ...
By Risk_Analyst
GAO Report Examines State Department Cybersecurity Risk Software. “New software being used by the State Department to assess security weaknesses is helping improve real-time awareness of vulnerabilities, according to a Government ...
RiskIntel
Cybersecurity Forum - Washington Business Journal
Cybersecurity is not just a technical issue; there are enormous business and economic implications that require strategic and operational planning.
www.bizjournals.com/washington/calendar/212991
The Smart Grid's Cyber-Security Questions
Publication: The Energy CollectiveIssue: August 3, 2011The stakes are steep. The challenge is nuanced and evolving. And, at this point, there areat least ...
smartgrid.ieee.org/.../5527-the-smart-grids-cyber-security-que...
cybersecurity careers | Stay Safe Online
Second Nature - The Cyber Security Blog · Free Security Check-Ups · STOP. THINK. ... Home |cybersecurity careers. Second Nature - The Cybersecurity Blog ...
www.staysafeonline.org/blog-categories/cybersecurity-careers
California Adopts First Standards for Cyber Security of Smart ...
But experts warn the rules must be part of a much larger strategy by utilities to prevent financial fraud and other security breaches.
www.ibtimes.com/.../california-adopts-first-standards-for-cybe...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com