City University launches new UK cyber-security centre

City University launches new UK cybersecurity centre
ComputerworldUK
The new Centre will coordinate these efforts for the first time and enable us to address a wider range of cyber security threats,” said Rajarajan. One of the Centre's first projects will be The Uncertainty of Identity, which plans to look at the thorny ...
DHS Warns of Anonymous Cyber-Attack Tools, Planned Mass Protests
eWeek
2 security bulletin from the DHS National Cyber-Security and Communications Integration Center warned financial services companies to be on the lookout for attackers operating under the Anonymous umbrella to "solicit ideologically dissatisfied, ...
Address the Threat Landscape of Cyber Attacks
SYS-CON Media (press release)
Following on from the success of the European Smart Grid Cyber Security Forum held in March 2011 in London, the second addition in SMi's Cyber Security portfolio; Smart Grid Cyber Securityand Privacy, will be held in Amsterdam on the 14th and ...
US corporations beef up e-security
Al Jazeera
A survey of fifty large US companies found they spent 56 per cent more on cyber security this year. Some companies are headhunting for what they call e-security consultants. As Al Jazeera's Kristen Saloomey reports, many of them are former hackers.
PowerPlayer: Congressman James Langevin
GoLocalProv
This is particularly true in the areas that have the most potential to help our economy grow, such as engineering, cybersecurity, health care IT and energy, which often require an advanced level of science and math education. ...
High-Tech Bridge is a Speaker and Gold Sponsor at Hashdays 2011 by DEFCON ...
PR.com (press release)
High-Tech Bridge participates regularly at various cyber security events in Switzerland and abroad. Recently this year High-Tech Bridge was speaker and sponsor at Swiss Cyber Storm in Switzerland, and GOLD sponsor at GS Days in France. ...
Thailand shows high potential: BSA study
The Nation
Bolstering cyber security and protecting privacy are among the policy enhancements that would raise Thailand's economic opportunities in relation to cloud computing and digital economy regulatory environments. "The rapid growth of cloud computing ...
A Decade Later
Signal Magazine
In July, DHS Undersecretary Jane Lute signed a nonbinding memorandum of understanding with Indian officials agreeing to collaborate on cybersecurity matters. Napolitano's schedule in the past year has included numerous overseas trips designed to help ...
9/11 TEN YEARS LATER: How Sept. 11 forever changed mindset at Limerick nuclear ...
The Mercury
In 2009, NRC ordered all plants to create or update their cyber security plans. Plants were required to “identify critical digital assets; establish a defensive architecture to protect these assets and apply security controls to these assets. ...
US companies recruit former hackers
Aljazeera.net
A survey of 50 large US companies found they spent 56 per cent more on cyber security this year. Some companies are recruiting "e-security consultants". As Kristen Saloomey reports, many of them are former hackers.
Preventing the Next 9/11
New York Times
This is why Interpol's 188 member countries unanimously approved the creation in Singapore of a global complex to better prepare the world to fight cybercrime and enhance cybersecurity. So as we honor the memories of those who perished 10 years ago, ...
Diplomats questioned Microsoft deal with Tunisian regime
Register
The deal Smaoui brokered was sold as a "co-operation agreement on e-governance, cybersecurity, intellectual property rights, to help expand the Tunisian IT sector", with Microsoft pledging training for handicapped Tunisians to help them find work in ...
Defence set to give US greater military access
The Australian
Other key areas for discussion at the talks will be cyber security, progress in Afghanistan and the state of the Joint Strike Fighter project. Australia plans to buy up to 100 of the revolutionary multi-role jets to replace the RAAF's F-111 bombers, ...
Staying safe in cyberspace
Oak Ridger
Mason said ORNL is actively engaged in cyber security, but said the general public should also be educated. "Anything smarter than a toaster is a computer," he said, explaining that computer technology is at work in TVs, cable boxes, medical devices ...
Hackers Forge Certificates to Break into Spy Agencies
PCWorld
Chris Soghoian, security and privacy researcher at Indiana University and Graduate Fellow at the Center for Applied Cybersecurity Research, said the list is a "very interesting set of sites." However, he's skeptical that the hackers could have ...
POLITICS AS USUAL (By Jim Baron) We need a new way to deliver electricity
Woonsocket Call
Congressman Jim Langevin, among many others, is particularly interested in cybersecurity, and, at least in part, how it relates to the national electrical grid. Nature did last week . . . damage by accident, what would happen if terrorists set out to ...
Made in Lafayette: 'Manufacturing is booming' here
Journal and Courier
From engineered tissue to aviation biofuel, from targeted cancer drug therapy to genetically superior plants and seeds -- from helicopter air frame design to cyber security software," said Joseph Hornett, senior vice president, treasurer and chief ...
Understanding open source technologies, the ethical way
Daily News & Analysis
There is a lot more scope in developing applications based on cyber security and monitoring purposes for smartphones, as it is still a new concept. Open source in India's business sector can save $2 billion making it easier and faster to process ...
Internet: Government Dominance or Governance?
CircleID
That is why it surprises me that the Dutch government focuses its National Cyber Security Strategy for 99% on the national level. (Well, it doesn't in the present circumstances, but I'm sure you know what I mean.) The Diginotar debacle hopefully set ...
9/11 changed how some view and handle their security
The Herald-Mail
Now, there is a heightened awareness of cyber security, and simple things like use of a credit card on the Internet can become a big deal, she said. “Now, we're reminded every day how vulnerable we are,” Hayes said. Aarsand left Haven Lutheran Church ...
Hackers Versus Insider Threats
IT Business Edge (blog)
The positive takeaway is that organizations are now seeing that cyber security needs to be a top concern. But a threat is a threat, whether it comes from an anonymous stranger a country away or from the absent-minded co-worker in the next cubicle.
National security - guide to legal careers in national defence
Lexology (registration)
Also, the field of cyber security. Systems have to be continuously re-designed to protect government and private sector assets. There is and will continue to be a tension between privacy and National Security issues. This is a growing field in dealing ...
Training a new generation of cybersecurity experts is higher ed's ...
Amid the threat of cyberwarfare, training a new generation of highly-skilled cybersecurityprofessionals is higher education's newest goal. The Department of Homeland Security has doubled its cybersecurity workforce in the last two years and ...
USA TODAY College
India Hacked: Part I | The India Site | Dishing up Indian news and ...
By admin
Eugene Kaspersky, one of the world's best known cyber-security experts and the co-founder of the anti-virus company Kaspersky Labs, views India as being under constant attack from many different sources. Speaking from Moscow, he told ...
The India Site | Dishing up Indian...
The quest for an unhackable code | Daily Guide Newspaper
By Nicholas
The creators of Engima-DS, pictured above, say they've created an unhackable code -- but experts say good encryption is the least of our cybersecurity problems. That's what a father and son team from Calgary, Alberta, say they've created. ...
Daily Guide Newspaper
IQPC Cyber Security for Government Asia 2012
Malaysian government agency CyberSecurity Malaysia announced that during a half-yearly review of reported incidents, cyber security incidents showed an ...
www.iqpc.com/Event.aspx?id=566928
Cyber Security Challenge « SecureThinking
Karl Smith, Head of Cyber Security Assurance Services, BT Global Services. Jim Tiller, Global Security Practice Head, BT Global Services. Toby Weir-Jones ...
www.btsecurethinking.com/tag/cyber-security-challenge/
Lumeta: IPsonar for Cyber Security
IPsonar for Cybersecurity. Lumeta IPsonar® makes it possible to conduct ... Federal Government Certification [PDF] · Watch a demo of IPsonar for Cyber Security ...
www.lumeta.com/cyber-security/

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com