NIST Seeks Input on Cybersecurity Plan


NIST Seeks Input on Cybersecurity Plan
Lab Manager Magazine
The National Institute of Standards and Technology (NIST) today issued for public comment on a draft strategic plan for the National Initiative for Cybersecurity Education (NICE) program. The plan, "Building a Digital Nation," outlines NICE's mission, ...
New class graduates from cyber security boot camp in Delaware
The Republic
cyber security camp in Delaware is celebrating its latest class of graduates. The US Cyber Challenge Camp at Delaware Technical and Community College in Dover is a week-long boot camp designed to help attendees become the nation's next generation of ...
Whiteford, Taylor going after clients in cybersecurity
Bizjournals.com
Whiteford, Taylor & Preston LLP , a 153-lawyer business law firm, has established a group that advises clients on the legal issues related to cybersecurity and the protection of online data. It's not alone in seeing a business niche in cyberlaw. ...
Vietnam joins int'l community in ensuring cyber security
VOVNews.vn
(VOV) - Vietnam has been actively cooperating with the international community in the fight against cyber crime, said Nguyen Phuong Nga, spokeswoman of the Vietnamese Foreign Ministry. She told a regular press briefing on August 11 that the Vietnamese ...
Vangent's Dr. John W. Jones to Present on Cybersecurity Screening at 2011 ...
PR Web (press release)
Vangent, Inc., a leading provider of pre-employment risk assessments, today announced that a research study conducted by its Human Capital Sciences Unit has been selected to be presented at the 2011 Society for Police and Criminal Psychology conference ...
Cybercamp Challenges, Rewards Future Cybersecurity Pros
Signal Magazine
By Max Cacas, SIGNAL Online Exclusive Young summer campers whose focus is cybersecurityrather than swimming or working on their tan had a chance to show their skills and maybe earn a scholarship recently in Virginia. It is part of the latest in a ...
Cybertheft and the US Economy
Council on Foreign Relations
In August 2011, the cybersecurity firm McAfee released an eye-opening report (PDF) detailing its investigation into a multi-year, most likely state-sponsored cyberattack that includes intrusions into the US federal government and defense contractors, ...
New Agency to Boost Fed's Cyber Security
The Epoch Times
A few months before January's attacks, in late 2010 Public Safety Canada introduced its Cyber Security Strategy. The strategy notes: “The most sophisticated cyber threats come from the intelligence and military services of foreign states. ...
Cyber security and hacking insulin pumps
Czech Position
Television commentators speak about the internet as the possible starting point of a third world war, cyber security has become a multibillion dollar business and people everywhere have come to realize just how vulnerable the young technological ...
Education briefs
Baltimore Sun
The couple set up the Barrett and Anne McKown Scholarship for Cybersecurity Study as an open fund to allow ongoing contributions from the community. Preference will go to a US citizen living in Anne Arundel County, who is attending a cybersecurity ...
Regis University deploys access control technology from Brivo
SecurityInfoWatch
By Brivo Regis University recently deployed Brivo's ACS WebService to manage security at its new Cybersecurity Education Center. Bethesda, MD, August 10, 2011 – Brivo Systems LLC, leader in Software as a Service applications for security management, ...
Many businesses ignore cyber threats despite risks
The Tennessean
Brown was among 1500 of the nation's chief corporate and government cybersecurity experts who gathered in Nashville this week for the GFIRST cyber threat conference — an annual event that has tripled in size in the past five years. ...
Over 8000 cyber attacks on CWG ticketing system: Shivshankar Menon
The Hindu
Mr. Menon identified cyber security as an important area in which India needs to invest in days to come. In the past, websites of the Indian Army, the Prime Minister's Office, even NIC's own website has been attacked by hackers.
Caution urged when meeting online date for first time
Calgary Herald
By Clara Ho, Calgary Herald August 12, 2011 5:04 AM Police, cyber security experts and criminologists are urging individuals to use caution when meeting an Internet acquaintance in person in the wake of an incident in which a man lured by an online ...
Cyber expert fears misuse of Aadhar or UID numbers
Economic Times
NEW DELHI: The Aadhaar Number, or the Unique Identification Card (UID) that will create a database for 1.2 billion people in India, may go out of hand, leading cybersecurity expert R. Bhaskar says. "The facility is ambitious and is sure to make ...
Award Winning Smart Grid Security Services Unveiled by UtiliWorks and Digital ...
RedOrbit
Digital Defense and UtiliWorks will be at the DOE Smart Grid CyberSecurity Information Exchange in Chicago on August 23rd to discuss the deployment of effective security solutions for Smart Grid applications. Digital Defense and UtiliWorks have worked ...
Data Privacy and Protection
Press Information Bureau (press release)
The cooperation between India and the US in the area of cyber security is in the form of Memorandum of Understanding between Indian Computer Emergency Response Team (CERT-In) and the US CERT. This MOU covers the aspect of exchange of information on ...
CMU's Nicolas Christin Finds Web Hackers Profiting From Illegal Online Pharmacies
MedIndia
11, 2011 /PRNewswire/ -- A growing number of illegal online pharmacies are flooding the Web trying to sell dangerous unauthorized prescriptions, according to a new report from cybersecurity experts at Carnegie Mellon University. PITTSBURGH, Aug. ..
Federal protection reform bill passes House subcommittee vote
Examiner.com
The House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies passed, by voice vote, HR-2658, “The Federal Protective Service Reform and Enhancement Act.” HR 2658 was introduced by subcommittee chairman Rep. ..
Chinese Regime Suspected of Cyber Attacks on Taiwan's Opposition Party
NTDTV
Taiwan's opposition party is calling for the government to pay more attention to cyber security. It comes after revelations that the email accounts of its senior staff have been hacked by China's Communist regime. The pro-independence Democratic ...
Reality-Based Cyber Crime Novella Explores Aftermath Of Stuxnet Attack On Iran
Dark Reading
Recent cyber security attacks using sophisticated malware (think Stuxnet) and social engineering techniques have raised the bar for defenders. Cyber Styletto pivots off these cyber events to educate and entertain. It is written as fact-based fiction. ...
Law Firms Are Giving Cyber Law A New Shape
Cjnews India (blog)
It has crossed the frontiers of cyber law to areas like cyber forensics, cyber security, ICT and telecom policy, etc. Further, Perry4Law also maintains a blog on international ICT policies and strategies that no other law firm of the world is ...
Sony's sobering troubles illustrate the need for cyber security insurance
Lexology (registration)
In order to avoid the coverage troubles faced by Sony, companies should consider the purchase of acyber security policy. Cyber security policies provide defense and indemnity coverage for third-party claims such as the class actions filed against Sony ...
Web Host Horizon Names VP of Federal Sales
Web Host Industry Review
He is an expert, says the company, in virtualization, cyber security and cloud technologies and their application in government. Before joining Horizon, he held an executive sales role at LTI DataComm, responsible for sale of IT systems to the federal...
Howard touts Carroll County as prime location for BRAC-related business
Baltimore Sun
He said the county offers workforce training services and facilities, including programs offered through Carroll Community College, as well as a Green Enterprise Development Training program and a cybersecurity careers consortium. ...
Evolve executable ICT strategies for digital inclusion, NITPPF declares
Vanguard
*There is need to deepen enlightenment and discussion on key issues such as broadband infrastructure, digital spectrum dividend, cloud computing, Cybersecurity, social networking, management of critical Internet resources, localization, ...
ManTech Awarded Follow-on Contract to Provide Logistics, Analytical and ...
MarketWatch (press release)
ManTech's expertise includes command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) lifecycle support, cyber security, global logistics support, intelligence/counter-intelligence support, ...
Old hacking tricks work too easily in attacks on HTML5, security expert says
VentureBeat
A recent report by the European Union's cyber security agency, ENISA, said the security threats number around 50 and they aren't that small. One way to mitigate is to use SSL, or secure socket layer, “HTML5 is not going to go away anytime soon,” Chow ...
Chinese Hackers Blamed for Latest Leak at Nate, Cyworld
The Chosun Ilbo
"We believe that top-of-the-line hackers were responsible for the latest attack, due to the sophisticated nature of the malignant file that was used, and the brazen way in which they infiltratedcyber security company ESTsoft," police said. ...
Morning Security Brief: Counter-Meth Funding Cuts, Prison Cell Phones, HIPAA ...
Security Management
NIST seeks public comment on a draft of the National Initiative for Cybersecurity (NICE). The plan, "Building a Digital Nation," outlines NICE's mission, vision, goals and objectives, the press release states. Brazilian police are setting up ...
Cyber snooping
Deccan Herald
The only defence is to keep upgrading cyber security through constantly improving technologies. There have to be consultations among governments to evolve an agreement on what is permissible and what is not in the cyber world. ...
Government should sell ad space on dot-gov websites, entrepreneur says
Nextgov
Some computer security experts say that letting commercial ads into federal networks would exacerbate cybersecurity threats. "You're incurring one more risk," said W. Hord Tipton, a former Interior Department chief information officer who now serves as ...
Moody's: US Debt Ceiling Agreement to Yield Half-a-Trillion or More in Defense ...
defpro
Moody's also points to cyber security and unmanned aviation as areas likely to be less affected by cuts and more likely to continue and in fact accelerate recent growth trends, noting that potential threats and constantly rising risks are only ...
Burning issues
The Standard
"If you use Blackberry Messenger it's usually just you or your local group of contacts you've personally approved who can see your messages," notes Alastair Paterson, chief executive of cybersecurity firm Digital Shadows. ...
Guest post: DEF CON Declares Cybersecurity to be Non-Existent ...
By dreamsburnred
This guest post was written by Jessica Wagner, a freelance writer from San Diego, CA. The annual DEF CON cybersecurity conference got more attention in 2011.
Canadian Tech Blogger
Facing Computer And Cyber Security Threats | Computer Technology
By Computer Technologist
Who did fall for any cyber security threat? Cyber security crimes are not just limited to hacking, financial, personal and work-related information theft. Viruses, worms, Trojan horse, spyware and malware are among the cyber security ...
Computer Technology
Cyber Attacks in Asia Reflect Global Cybersecurity Issues ...
By John Casaretto
Understanding the Nuances Between Unstructured Data and Unstructured Content · HP Bets on Open Stack versus iTunes-like Lock-in. SPONSORED POSTS. SILICONANGLE PHOTOS. siliconANGLE » Cyber Attacks in Asia Reflect Global Cybersecurity ...
SiliconANGLE
NIST Seeks Input on Cybersecurity Plan | FedCyber.com
By AlexOlesker
The National Institute of Standards and Technology (NIST) today issued for public comment on a draft strategic plan for the National Initiative for Cybersecurity Education (NICE) program. The plan, “Building a Digital Nation,” outlines ...
FedCyber.com
Cybersecurity conference begins « CyberMaryland
By cybermaryland
The Department of Homeland Security's (DHS) seventh annual conference on cybersecurity began on Sunday in Nashville. The event is hosted by the Homeland Security agency in charge of responding to cyber-attacks on the nation's ...
CyberMaryland
Dartmouth Programs Grow Future of Cyber Security | Dartmouth Now
Dartmouth's SISMAT 2011 immersed undergraduate students from across the United States and beyond in the ways of cybersecurity. From left, first row: Justin Kearns (University of Scranton), Jonathan Grochowski (Lewis and Clark College), ...
Dartmouth Now
When Countries Like North Korea Boost Their Cyber Security The ...
By Lee
For years now, we have seen different countries from around the world attempt to try and build up their cyber security. This was done for the sake of their nation's security and for the purpose of being able to strike first on a cyber ...
Security FAQs
Groupon reveals security breach in India « CyberSecurity Idiots
By s0ndra
By Ammu Kannampilly (AFP), June 29, 2011. NEW DELHI — The Indian subsidiary of online deals giant Groupon has accidentally published email addresses and passwords from its subscriber database, the company and reports said Wednesday. ...
CyberSecurity Idiots
China Looks for Cooperation to Battle Cross-Border Cyber Attacks ...
By Brian Prince
China wants to work with other nations to improve cyber security. Yet along with this pledge came another example of the back and forth between nation-states that has become a common feature of many public discussions about security.
SecurityWeek RSS Feed
QinetiQ's Keith Rhodes Spells Out Keys to Cyber Defense - The New ...
By Molly Mulrain
“However, the first steps to effective cybersecurity do not involve high-tech silver bullets. Rather, these initial steps require identifying critical assets, understanding the potential cyber threat, and relentless and ruthless testing ...
The New New Internet
NRC approves Limerick Nuclear's Cyber Security Plan - pottsmerc.com
The need to enhance “cyber-security,” a phrase used to encompass the computers and electronic controls inherent to the operation of the plant's two nuclear ...
www.pottsmerc.com/.../08/.../doc4e42f28223ff6179531206.tx...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com