White House Cybersecurity Coordinator: Privacy, Speech Protections Are Core Tenets

WH Cybersecurity Coordinator: Privacy, Speech Protections Are Core Tenets
Broadcasting & Cable
By John Eggerton -- Broadcasting & Cable, 8/4/2011 10:03:18 AM White House CybersecurityCoordinator Howard Schmidt said the administration continues to work with industry on how to work together to combat cyber crimes and protect infrastructure and ...
Military touts effective cyber-security measures
Focus Taiwan News Channel
Wang Teh-pen, an MND division chief in charge of information and communication security, said the ministry has adopted many strategies, including constant renewal of protective measures, to reinforce its cyber-security. (By Emmanuelle Tzeng and Sofia ...
Former CIA official cites rise in government cybersecurity awareness
SearchSecurity.com
LAS VEGAS – Both white hat and black hat security researchers alike today received a sobering warning from the Central Intelligence Agency's former director of operations: The opportunity has never been greater to foster government cybersecurity ...
McAfee's Operation Shady RAT exposes national cybersecurity lapses
SearchSecurity.com
In conjunction with this week's Black Hat 2011 hacker conference, security vendor McAfee Inc. has released details on what it describes as the most comprehensive revelation and analysis of previously undisclosed intrusions, which may threaten the ...
UN Cybersecurity Arm Endorses EC-Council's Global CyberLympics
Benzinga
The Global CyberLympics is endorsed by the UN's cybersecurity executing arm. The mission behind the games is to foster better cooperation and communication on cybersecurity issues among countries. The cybersecurity executing arm of the United Nations ...
South Korean Government Gears Up For Cyber Security Master Plan
Bernama
SEOUL, Aug 4 (Bernama) -- The government is pushing to build an integrated system for responding to cyber attacks to make the responses more swift and effective, a presidential official said Thursday. The lack of a coordinated response has often been ...
California Adopts First Standards for Cyber Security of Smart Meters
SolveClimate News
Smart grid experts applauded the new standards but said that utilities' compliance with them should be one piece of a much larger cyber security strategy. "What is more important here is to be creating a culture of security," Usman Sindhu, ...
Indian government to improve cyber security after 117 sites hacked in 6 months
The Next Web
New Government websites and applications will be audited from the cyber securityperspective prior to their hosting and after, on a regular basis. National Informatics Centre (NIC), which plays a crucial role of driving e-governance applications at ...
CACI Strengthens Cybersecurity
Daily Markets
In an effort to enhance cybersecurity capabilities, CACI International (CACI) recently signed a definitive agreement to acquire Paradigm Holdings Inc., the parent of Paradigm Solutions Corporation. The financial details of the contract were not ...
China's Huge New Cyberattack
Daily Beast
Richard Clarke, former head of US cybersecurity, says it's time to fight back. On Wednesday, the security firm McAfee revealed that a widespread cyberattack had targeted 72 organizations including the United Nations, governments, defense contractors, ...
Career Advice? One Word. Are You Listening? … Cybersecurity
CSO (blog)
The report notes that there is a severe shortage of cybersecurity professionals on the government side: “While the Obama administration has made cybersecurity a national priority and put forth efforts to hire more than 1000 cyber security experts at ...
Microsoft Announces $200000 Cyber Security Contest
eSecurity Planet
By eSecurityPlanet Staff Microsoft's Trustworthy Computing Group today announced the Microsoft BlueHat Prize contest, with prizes of up to $200000 for new ideas for defensive approaches to support computer security. "The top three winners in the ...
US wants to build cybersecurity protection plan for cars
Network World
That's why the US Department of Transportation (DOT) today issued a Request For Information to the security industry to help it devise a roadmap to build "motor vehicle safeguards againstcybersecurity threats and assure the reliability and safety of ...
Cyber security certification program launches
InTech
Sypris Electronics, LLC, a subsidiary of Sypris Solutions, Inc. partnered with Career Technical Education Foundation, Inc. (CTEF) and The MITRE Corporation to develop, establish, and host a cyber security curriculum for local and national high school ...
Apps make iPhone vulnerable to attack
CNN
By David Goldman @CNNMoneyTech August 4, 2011: 9:53 AM ET Cybersecurity experts said that several popular free apps, such as Facebook and Twitter, lack a key feature to protect iPhone users from attacks. LAS VEGAS (CNNMoney) -- Apple introduced an ...
East Africa: Board Joins Fight Against Cyber Crimes
AllAfrica.com
East African Community (EAC) member states have committed to develop a strong and effectivecyber-security framework to protect the bloc against cyber threats. During the 2011 regional workshop on Cyberspace Security held in Nairobi, Kenya, ...
Protecting Your Data Is Critically Important in the Era of Being Hacked
CSNews Online
No longer does the idea of a "hard outer shell" constitute an adequate approach tocybersecurity. The term "cybersecurity" aptly defines the spectrum and magnitude of security, data privacy and protection. For retailers, this means striving to ...
US Probing Report On Rash Of Global Cyberattacks
RadioFreeEurope/RadioLiberty
US Department of Homeland Security analysts work at the NationalCybersecurity & Communications Integration Center (NCCIC) located in Arlington, Virginia. (file photo) The US government has acknowledged a new study by a computer-security firm that says ...
PRESS DIGEST - New York Times business news - August 4
Reuters
An American cybersecurity company issued a report on Wednesday saying that it had identified a single perpetrator of cyberattacks that lasted up to five years on a wide range of governments, American corporations and even United Nations groups, ...
Black Hat shows hacker exploits getting more sophisticated
USA Today
By Byron Acohido, USA TODAY LAS VEGAS — Fresh evidence that the Internet has become saturated with hacking groups relentlessly striving to crack into company networks grabbed attention as the Black Hat cybersecurity conference got underway here ...
Anonymous Hacking Skills "Rudimentary" For Now
InformationWeek
Anonymous so far "has not demonstrated any capability to inflict damage to critical infrastructure, instead choosing to harass and embarrass its targets," the DHS said in a bulletin released by its National Cybersecurity and Communications Integration ...
Nation's Infrastructure Still Vulnerable to Cyber Attack
ABC News
Lawmakers in Congress are stalled on legislation that would overhaul the nation'scyber security. Senate Majority Leader Harry Reid, R-Nev., sent a letter Wednesday to Senate Republican leaders urging them to put cyber security back on the agenda....
Talk of the Day -- Cyberattack from China? Beyond reasonable doubt
Focus Taiwan News Channel
Major local newspapers cited cybersecurity experts at home and abroad as reporting Thursday that China is the most likely culprit. The McAfee report said organizations in the United States constituted 49 of the 72 targets in the hacking, ...
Oil industry prime target for hackers, technology experts caution
Calgary Herald
Alberta is no more or less susceptible to high-tech attacks than anywhere else, but it is home to some particularly prized targets, says a Calgary-based cybersecurity specialist. "I would say there are a number of high-value targets in the province," ...
Virus steals data from at least 85000 computers in Vietnam
Thanh Nien Daily
Vietnam's leading cyber security center reported Monday that at least 85000 computers in Vietnam had their data stolen after being infected with a virus last month, raising concerns that hackers obtained important information. ...
Warlords versus Merchants: the real battle for the control of cyberspace
ComputerWeekly.com (blog)
By Philip Virgo on August 3, 2011 10:38 PM | No Comments | No TrackBacks The current hype in support of additional US and UK government spend on cybersecurity has prompted me to return to my "Warlords versus Merchants" theme. ..
cryptogon.com » U.S. Wants to Build Cybersecurity Protection Plan ...
By Kevin
As cars and other forms of transportation increasingly rely on online systems for everything from safety to onboard entertainment, the cybersecurity threat from those who would exploit such electronic control packages has also increased ...cryptogon.com
Kevin Brown Named to Lead Raytheon Cybersecurity Operations at Fort Me
"Kevin Brown's appointment signals the installation of Raytheon senior leadership at Fort Meade - an advance that will help ensure that our operationally proven cybersecurity capabilities are fully accessible, scaled and adaptable to ever- evolving needs." ... Oct 20 - 21, 2011; Military Cyber Security Conference Washington, DC,United States Sep 7 - 9, 2011; Cyber Warfare Europe 2011 Conference Berlin,Germany Sep 26 - 29, 2011. More events on ASDEvents.com ...ASDNews.com: Be the first to know
California adopts first standards for cybersecurity of smart ...
By SolveClimate News
California adopts first standards for cybersecurity of smart meters. >> SolveClimate News. Share/Bookmark. California regulators have adopted the nation's first privacy rules for household smart meters, vowing to protect consumers from ...
Midwest Energy News
Fix cybersecurity: Rent a cyber-mercenary? | ESET ThreatBlog
By Cameron Camp
sort of digital version of the oft-illustrious Blackwater firm (since renamed Xe); a modern day cyber rent-a-mercenary program for governments.
ESET ThreatBlog
CYBER SECURITY: UN among victims of massive cyber-spying campaign ...
By Wire News Sources
Cyber-security experts have unveiled one of the biggest computer hacking campaigns to date, releasing a list of 72 organisations whose networks were attacked.
Herald de Paris
Cyber security certification program launches – InTech
By lowes1
Sypris Electronics, LLC, a subsidiary of Sypris Solutions, Inc. partnered with Career Technical Education Foundation, Inc. (CTEF) and The MITRE Corporation to develop, establish, and host acyber security curriculum for local and ...
Why CTE: Career Technical Education
DoD Buzz | Ongoing cyber-attack didn't target military, officials say
By Philip Ewing
As uniformed commanders, civilian leaders and lawmakers have spent the past five years talking about how we really need to start talking about cyber-security — each event includes the same litany of scary warnings, ... UMUC's cybersecurity programs are designed to address the serious workforce shortages of highly skilled cyber professionals needed to protect our nation's infrastructure. These programs provide students — looking to advance professionally, change careers or ...DoD Buzz
Cyber Security: Report Uncovers Widespread Attacks
Cyber security standards - Wikipedia, the free encyclopedia · Cybersecurity | The White House · Report identifies widespread cyber-spying ...
www.huffingtonpost.com/.../cyber-security-report-uncovers-w...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com