TSA Improves Wireless Cybersecurity After IG Audit


TSA Improves Wireless Cybersecurity After IG Audit
HSToday
The Transportation Security Administration (TSA) recently adopted improvements in practices to patch and configure software on its wireless networks to improve cybersecurity, following recommendations of the inspector general (IG) at the Department of ...
Iran to conduct cyber security manoeuvre: Report
Times of India
TEHRAN: Iran plans to conduct a "cyber security manoeuvre" to increase readiness against possible cyber attacks on the country, state-run Press TV reported. The announcement was made by chief of the Passive Defence Organisation, Brigadier General ...
Med-device hacking poses deadly potential
Minneapolis Star Tribune
Photo: Isaac Brekken, Associated Press Hundreds of cyber-security geeks watched recently as Jay Radcliffe stood on a Las Vegas stage and hacked into his own insulin pump, disabling its life-saving therapy. The 33-year-old cyber-security researcher said ...
So, What Makes You a Cyber 'Expert'?
Infosecurity Magazine (US) (blog)
How many cybersecurity practitioners have had a colleague either in information technology (IT), or worse yet, from an unrelated field, offer advice on security matters and insist that they are acybersecurity 'expert'. This happens all too often to ...
Pros and Cons
GovExec.com
By Brittany Ballenstedt bballenstedt@govexec.com August 22, 2011 The Obama administration recently released a blueprint outlining steps to improve the recruitment, hiring and training of thecybersecurity workforce. The strategy is part of the National ...
Where the Action Is
Wall Street Journal
Another big plus: a stream of skilled graduates from the Institute for Cyber Security at the University of Texas at San Antonio. But not all the firms in town are counting on government contracts. The city has a growing group of businesses that cater ...
Security in 60 Seconds
Voice of America (blog)
Arguably it's more likely the web was significantly less secure even a decade ago, before corporations and governments began taking cyber-security seriously. Still, threats to our online privacy and security are growing – and growing more sophisticated ...
Czech cyber crime center to be managed by security office - press
Czech Happenings
Prague - The Czech Interior Ministry will pass the sphere of cyber security to the National Security Office (NBU), daily Pravo writes today. The Interior Ministry was seeking the establishment of a government center against Internet threats for a ...
With money moving hands, online crime comes of age
Times of India
MUMBAI: Last month, cyber security company Imperva reported that websites experience at least 27 attacks every hour. When hackers engage automation, this figure goes up to 25000 per hour. The scale of the phenomenon suggests that such attacks are not ...
Sourcefire to Discuss Best Practices for Security in Virtual Environments at ...
MarketWatch (press release)
COLUMBIA, Md., Aug 22, 2011 (BUSINESS WIRE) -- Sourcefire, Inc. /quotes/zigman/103662/quotes/nls/fire FIRE -0.95% , the creator of Snort(R) and a leader in intelligent cybersecurity solutions, today announced that Richard Park, senior product manager, ...
Contractors wrangling over coveted Veterans Affairs program
Washington Post
The contention over the program, which covers a broad range of work, whether it be supporting facilities or providing cybersecurity services, reflects a more competitive contracting environment. Concerned about future spending cuts, contractors are ...
Guide to S.A. 2011: 2011 business mood is upbeat
San Antonio Express
The bright spots in the area economy, Perez said, include aerospace, insurance, banking, information technology, cybersecurity, tourism and health care/biosciences. Aerospace received a big, highly visual boost in March when the first Boeing 787 ...
Iran plans cyber security drill
PanARMENIAN.Net
PanARMENIAN.Net - Head of Iran's Passive Defense Organization says the Islamic Republic plans to hold a massive cyber maneuver to increase readiness against possible cyber attacks on the country. Brigadier General Gholam-Reza Jalali said that the drill ...
Hacked cybersecurity firm HBGary storms back
Sacramento Bee
Reader comments on Sacbee.com are the opinions of the writer, not The Sacramento Bee. If you see an objectionable comment, click the flag icon below it. We will delete comments containing inappropriate links, obscenities, hate speech, and personal ...
SERDI Awarded GSA STARS II GWAC Contract
PR.com (press release)
SERDI offers comprehensive Cyber Security and Information Technology Engineering Services. Our full suite of services includes strategic planning and business processes, development, training, and program management- providing expert advice on ...
Exchanges defend against cyber attack
Financial News
To admit to such a security breach could not only inflict reputational damage, but expose an institution to further attacks, according to cyber-security consultants. Nik Whitfield, head of the investment banking group at consultancy BAE Systems Detica, ...
Harris Corporation... Process Betterment (GPS)
SatNews Publishers
This capability enables users to create interoperable network geo-location and visualization solutions for applications in cyber security and local area networking, as well as for mapping elements of a wireless network,- such as access points and ...
Big Brother's Cell Phone “Kill Switch”
Atlanta Journal Constitution (blog)
Even more broadly, legislation has been introduced in past sessions of Congress that would give a president an Internet “kill switch,” to be activated in the event of a perceived cybersecurity threat. Supporters of the proposal, including Sen. ...
Beware of Rick Perry, the French cuff cowboy
Aljazeera.net
Uses taxpayer money to enrich his corporate-lobbyist friends - and endangers the United States of America by inviting a Chinese telecom company into Texas that George W Bush's national security team warned him would pose a cyber-securitythreat to our ...
Users will see no difference with NGEN, says Hendricks
FierceGovernmentIT
In the case of ISOOA, Navy officials decided that the Navy 10 th Fleet and Defense Department Cyber Command provide sufficient in-house cybersecurity capability. The evaluation criteria for the two RFPs will be lowest price, technically acceptable, ...
Seize the Day
SC Magazine UK
“I will remain as vice chairman of the Intellect cyber security group and we will remain engaged with government on guidance to viewpoints on policy and direction. I work for a vendor but I look at it as other directors would. ...
Force 3 Successfully Deploys Network Access Control for Booz Allen Hamilton
PR Web (press release)
Force 3 is the trusted provider of Data Center, Communications and Collaborations, Borderless Networks and Cyber Security services for Federal agencies, Enterprise organizations and their key partners. With headquarters in Crofton, Md. and offices in ...
Biden assures China that its US assets are 'safe'
TODAYonline
He said there needed to be more contacts between their civilian and military leaders over security issues, especially on cyber security and maritime issues where the sides view matters from different perspectives. "Our generals should be talking to ...
The mobile security conundrum
Financial Director
A major report published recently from the CNCCS, Spain's national cybersecurity advisory council, found a general lack of security awareness amongst mobile users and their general carelessness are the two main risk factors for smartphones in business....
Boeing, Siemens form strategic alliance for Department of Defense energy ...
Military & Aerospace Electronics
The Siemens and Boeing alliance offers such energy modernization capabilities as end-to-end engineering and construction, network and smart grid integration, cybersecurity, energy efficiency, energy management and storage, next-generation alternative ...
Cyber Attacks and Intellectual Property Theft | Defense Tech
By John Reed
The time has come for executives to become fully engaged in cyber security given their corporate crown jewels are at great risk. August 22nd, 2011 | Around the Globe, Cyber Security Center, Net-Centric | 14087No ... UMUC's cybersecurity programs are designed to address the serious workforce shortages of highly skilled cyber professionals needed to protect our nation's infrastructure. These programs provide students — looking to advance professionally, change careers or ...
Defense Tech
Cyber security for virtual and cloud environments - Spirent ...
Cyber security for virtual and cloud environments, a White Paper submitted by Spirent at IThound.com.
www.ithound.com/.../cyber-security-virtual-cloud-environmen...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com