Cyber security: threats and opportunities


Cyber security: threats and opportunities
Intelligent Utility
In yesterday's EnergyBiz Leadership Series webinar, "Strategies for Securing the Smart Grid," I heard three very valuable and disparate perspectives on cyber security. I'll share a sense of the discussion here, though you may also wish to replay that ...
NIST seeks comments on cybersecurity draft strategic plan.
ThomasNet Industrial News Room
August 19, 2011 - NIST issued for public comment a draft strategic plan for the National Initiative forCybersecurity Education program. The plan, "Building a Digital Nation," outlines NICE's mission, vision, goals, and objectives. ...
Cybersecurity growth linked to education offerings
Gazette.Net: Maryland Community News Online
2) of Cockeysville, speaking at the annual Maryland Assocation of Counties conference Wednesday in Ocean City, is an advocate for Maryland to become a leader in the cybersecurity field. OCEAN CITY — Maryland has the potential to become the Silicon ...
DARPA challenges industry for new ideas on cyber security technologies of the ...
Military & Aerospace Electronics
If DARPA could only invest in one cyber-security research area, what should that be and why? DARPA is inviting the nation's cyber security experts to offer answers to these questions, and based on their answers, DARPA experts may invite them to a ...
Battle updates SMD Conference on Cyber Huntsville progress
The Huntsville Times - al.com
By Mike Kelley, 42 staff HUNTSVILLE, Alabama – A lot has happened over the past year to make Huntsville a center for cyber security, Huntsville Mayor Tommy Battle told gathering at the 14 th annual Space and Missile Defense Conference this week. ...
Scared Straight
GovInfoSecurity.com (blog)
On Thursday, I had a lengthy conversation about information asset classification with Tom Smith, director of New York State's Office of Cybersecurity (look for my podcast interview with Smith in the coming week), and our chat segued to how agency ...
To retrieve stolen data: Have it phone home to tell you where it is.
ITworld.com
By Kevin Fogarty Add a new comment Despite attention and activity from business, media and government about digital security growing so quickly it is becoming what Oquendo called a "Cybersecurity Industrial Complex," very little information has become ...
Cyber Workforce Plan: A Different Take
Nextgov
By Brittany Ballenstedt 08/18/11 12:33 pm ET The Obama administration late last week released a blueprint outlining steps to improve the recruitment, hiring and training of the cybersecurityworkforce. And according to one expert, the blueprint is on ...
Contractor Cyber-Security Pilot Program A Success: DOD
Law360 (subscription)
By Rachel Slajda Law360, New York (August 18, 2011) -- A 90-day pilot program to share classified intelligence about cyber-threats with private defense contractors has already stopped hundreds of attempted data thefts, a Defense Department official ...
Practicing Network Resiliency
GovInfoSecurity.com
In the age of high-profile attacks, such as a distributed denial-of-service attack in March against South Korean websites, organizations are shifting their focus in terms of cybersecurity. "Instead of assuming that we can prevent attacks, we focus very ...
Shambhu Upadhyaya
University at Buffalo Reporter
What are some of the most important threats to cybersecurity today? The biggest threat to cybersecurity is attacks on the nation's critical infrastructure, such as the electric power grid, transportation system, financial network and military assets. ...
US cyber defenses outmatched by hackers
Defense Systems
Add to those issues the phone hacking scandal that is rocking Britain, which now has the connected user community on edge, and also has increased the overall concern about cybersecurity for mobile devices. Although no country is isolated from the ..
Havoc in Cyberspace
Pasadena Weekly
In the effort to bolster their cyber defenses, US businesses this year have so far spent approximately $100 billion on cyber security, which is as much as was spent during all of 2010. Last month, a UCLA conference on cyber security was attended by 400 ...
2011 USSTRATCOM... Cyber + Space Centric (Event)
SatNews Publishers
[SatNews] Defense contractors and government agencies will showcase the latest products and solutions for cybersecurity during this event... The 2011 USSTRATCOM Cyber and Space Symposium will occur from November 15-17, 2011, at CenturyLink Center Omaha ...
SEC IT systems vulnerable
FierceGovernmentIT
A Sterling, Va., company hired by the Securities and Exchange Commission office of inspector general to search for cybersecurity control vulnerabilities in the agency's information technology systems came up with more than a few. ...
US secret computer runs on Chinese made parts
TechEye
The deal requires software from US cybersecurity firm Symantec to be installed over devices made by Huawei which has close ties to China's military. Huawei and Symantec formed a joint venture in 2008, with Huawei owning more than half of the shares. ..
Unification Ministry's Portal Subjected to Attempted Online Assault
SPAMfighter News
Subsequently, the center for cyber-security directed the assistant for resetting his password alternatively deactivating his e-mail for arresting any further interruption to the ministry's site. Furthermore the official stated that attempts at ..
US State Department: Armenia has held positive steps
Times.am
In December, the OSCE hosted in Yerevan a national expert workshop on countering terrorist use of the Internet and comprehensively enhancing cyber-security. In January, the Council of Europe's Committee of Experts on the Evaluation of Anti-Money ...
Studies Warn on Dangerous Liaisons in Drug Supply Chain as Shortages Loom Large
International Business Times
A baffling report from cyber security experts at Carnegie Mellon University states: "A growing number of illegal online pharmacies are flooding the web trying to sell dangerous unauthorized prescriptions." This research supported by a public health ...
Committee Report on Cybercrime Legislation Amendment Bill
Invest in Australia
“The Cybercrime Legislation Amendment Bill 2011 strengthens cyber security laws and enhance Australia's ability to combat international cybercrime,” he said. “While Australian law substantially complies with the obligations in the Convention, ...
Microsoft Warns IT Graduate Decline Could Jeopardise UK Jobs
eWEEK Europe UK
In July the boss of the UK's GCHQ complained that his department was losing valuablecyber security experts to the likes of Google, Microsoft and Amazon. And in February e-skills UK revealed that the UK is suffering something of a recruitment crisis, ...
Survey: 77% of IT Security Professionals Concerned about Smart Grid Cyber Security
Bradenton Herald
When asked “Are you concerned about smart grid cyber security?”, 77% responded “yes.” According to Tim Erlin, director of product management for nCircle: "It's not surprising that the majority of respondents is concerned. The smart grid initiative ...
TVA Board Implements Vision
PR Newswire (press release)
To meet the power requirements in the Valley, make nuclear safety modifications as a result of Fukushima, bolster cyber-security and continue investing in clean-air initiatives and energy efficiency, the board approved a 2 percent rate increase in ...
Inquiry picks holes in government Cybercrime Bill
CSO Magazine
"Australia must have appropriate arrangements domestically and internationally to be in the best possible position to fight cybercrime and cyber security threats." The Council of Europe Convention on Cybercrime is currently the only international ...
Thwarting the Age Old Man in the Middle
eSecurity Planet
Of these, man-in-the-browser has proved to be the biggest threat," explained Terry Nelms, research director for cyber security firm Damballa. MITB attacks are designed to slip around normal defensive plays such as traditional antivirus solutions and ...
Lulzsec leader: a 21st Century Billy The Kid?
ABC Technology and Games
On a positive note, major corporations, small businesses and governments have finally realised the importance of cyber security. While Lulzsec operated in the open, it ultimately used tools and methods that criminal hackers have known about for years ...
SANS Institute's NetWar challenge takes on the US military
Infosecurity Magazine (US)
Yori Kvitchko, senior technical analyst at SANS, told Infosecurity that the military has a “unique problem in the sense that they have this gigantic pool of [cybersecurity] candidates.” The military has to determine which of the candidates are ...
Pakistan partnership reaches for the stars
The National
Pakistan's space programme owes its existence to China's cooperation that spans from climate science, clean energy technologies, clean water technologies, cyber security and basic space, to atmospheric, Earth and marine sciences. ..
New York Adopts Smart Grid Policy
SmartMeters
... rate recovery will be addressed through traditional means; utilities can start to develop smart grid plans and projects using the existing industry standards as building blocks; utilities must develop and maintain cyber security standards; ...
U.S. government to work with India on cybersecurity | Simply Security
By Simply Security
The U.S. government recently turned to a key ally in an effort to improve cybersecurity around the globe.
Simply Security
Cybersecurity growth linked to education offerings | CyberMaryland ...
By AWinters
OCEAN CITY — Maryland has the potential to become the Silicon Valley of cybersecurity, but could miss out on a major economic opportunity unless it offers more programs aimed at recruiting students into a little-known field, ...
CyberMaryland - IT Security & Innovation
Cyber Security Workshop 2011 (Conference Alerts - academic ...
A Practical Workshop for that Provides a Managerial Approach to Emerging Cyber Security Issues, Tools, Challenges and Risks.
Australia conferences
National Initiative for Cybersecurity Education Strategic Plan
National Institute for Cybersecurity Studies (NICS) Portal. 285. Cyber Citizens Forums, Cyber Security Awareness Volunteer Education (C-SAVE) Project, ...
csrc.nist.gov/nice/.../Draft_NICE-Strategic-Plan_Aug2011.pdf
Navy adopts new cybersecurity inspection plan to perform on ...
Cyber inspections will now be performed on 900 command units in the Navy as part of a new routine.
www.defensesystems.com/.../AGG-Navy-ships-now-scanned-c...
DC: Cybersecurity Spurs NSA to Plan 3000 Hires | Dice Blog Network
NSA Will Hire 3000 in Cybersecurity Push: The NSA says it will hire as many as 3000 people over the next two years, many in cybersecurity...
news.dice.com/.../dc-pulse-va-adds-tablets-to-latest-contract/
Aussie Style Cyber Security
Aussie Style Cyber Security “When in Rome, do what the Romans do”. This famous quote can really apply to any nations around the world. ...
www.faronics.com/2011/aussie-style-cyber-security/

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com