Deterring attackers in cyberspace

Deterring attackers in cyberspace
The Hill
Raduege is a retired lieutenant general of the Air Force and former co-chairman of the Commission on Cyber Security for the 44th Presidency. He is currently a senior counselor of The Cohen Group and chairman of the Deloitte Center for Cyber Innovation.
Information Security and Privacy Board Meet
Cryptome.org
... --Discussion with Cybersecurity Coordinator and Special Assistant to the President, --Presentation on Security Automation and key focus areas, --Presentations on policies relating to national border database (National Vulnerability Database), ...
Code red: the cyber spy threat
Sydney Morning Herald
In a cable from June 29, 2009, a Beijing-based State Department cyber security officer discussed the ''strong possibility the PRC is harvesting the talents of its private sector in order to bolster offensive and defensive computer network operations ...
Global assaults on cybersystems mushroom
New Mexico Business Weekly
Alessandra Seazzu (standing) keeps an eagle eye on the cybersecurity tasks of University of New Mexico students Christopher Wallace (left) and Brandon Klein at the university's Information Assurance Research and Education Center in Albuquerque. ...
NIST releases latest cyber guide for agency networks
FederalNewsRadio.com
The Commerce Department has issued the latest word on how to spot cybersecurity weaknesses in federal computer systems: It's called the "Guide for Conducting Risk Assessments," and it's been published by the National Institute of Standards and ...
TIBCO Software's CEO Discusses Q3 2011 Results - Earnings Call Transcript
Seeking Alpha
What it was, was a cybersecurity deal. And so they're using us, the most secure parts of the government are using us for cybersecurity. And we believe that, in and of itself, is a huge opportunity, where we think it's applicable to the commercial ...
From the man who discovered Stuxnet, dire warnings one year later
MinnPost.com
Funny thing is, all these control systems, if compromised, could lead to mass casualties, but we still don't have any significant level of cybersecurity for them. LANGNER: It will be costly to fix the vulnerabilities in industrial-control systems. ...
Skadden, Arps, Slate, Meagher & Flom LLP | "Cybersecurity: What to Expect From ...
Linex Legal (press release) (registration)
A host of cybersecurity incidents this year, ranging from successful hacks into the systems of RSA, Lockheed Martin, Citigroup and Sony's Playstation Network, to McAfee's report of "Operation Shady RAT," a widespread, systematic program of cyber ...
Foreign spies with cyber eyes on our government
Sydney Morning Herald
In January last year, DSD created a Cyber Security Operations Centre to deal with the increasingly sophisticated intrusions into Australian government networks. Yesterday DSD revealed that in CSOC's first year of operation, it dealt with 188 incidents ...
Is an ISP code of conduct the best way to fight botnets?
Ars Technica
In a cybersecurity "Green Paper" published in June, the Department of Commerce's Internet Policy Task Force found that one of the main barriers to cracking down on botnets was that ISPs lack a mechanism for setting established commoncybersecurity ...
FTC relaunches cyber 'on guard' site
FederalNewsRadio.com
The FTC has also partnered with the Homeland Security Department and other agencies in the Stop.Think.Connect Campaign to raise awareness of the need for stronger cybersecurity with new approaches to help increase online safety and security.
Federal Comm. Commission Proposes Rules for Determining VoIP Outage Effects ...
The Open Press (press release)
According to Jeff Goldthorp, associate chief for cyber security, FCC, the primary goal of the rule is to make sure his agency is laced with the regulatory tools available to track problems with the VoIP telephone systems and also check on the outages ...
Apple sued over microprocessor patents; Mass. to investigate iTunes fraud
Apple Insider
Coakley revealed her own plight this week in statements made at an address to the Massachusetts Advanced Cyber Security Center. She said her office will be looking into the issue and "demanding answers" from Apple, which has not commented on the issue. ...
Security lessons from the PlayStation Network breach
VentureBeat
In September, Sony hired former the director of the National Cyber Security Center at the US Department of Homeland Security Philip Reitinger to be its new chief information security officer (CISO). Organizational complacency was also an issue that led ...
The Netizen Report: Governance Edition
Global Voices Online
Issues including cyber-security, diversity, freedom of expression, critical Internet resources, and the future of Internet governance will be discussed in Nairobi by delegates from all over the world representing governments, companies, the technical ...
DigiNotar Files Bankruptcy And Mitsubishi Breach
Security Pronews
Cyber security is a world of its own. Until programmers become security experts or security experts are hired to overlook the work of programmers, the National Vulnerability Database (NVD) will keep pumping out vulnerability updates by the dozens.
ONR goes back to school to open new pathways into science education
PhysOrg.com
With topics ranging from cyber security to submarine design and engineering, PTTC's programs have encouraged young people to learn about STEM with hands-on extracurricular challenges. "We're putting students in the pipeline," said Dr. Thurman Jones, ...
China: hacking gets industrial
Financial Times (blog)
Chinese representatives in international talks about cybersecurity have stubbornly refused to talk too much about cyberwarfare, an area their Western counterparts are most interested in, insisting that cybercrime is their biggest concern. ...
IT reforms moving to optimization stage
FederalNewsRadio.com
It covers governance, cybersecurity and commodity IT. You will hear a lot about commodity IT in the coming year." Commodity IT includes email, desktop software and other commonly used technology. In the end, Schlosser said the goal of the IT reform ...
The dark side
CanadianBusiness.com
In this respect, hackers are the key to cybersecurity as they hold the solution to the conundrum. Find and understand the hackers, and you will have made serious strides toward uncovering the truth. The overwhelming percentage of funds that governments ...
Citigroup Inc. (NYSE:C) Funding Fight Against Cyber Crime
StocksandShares.TV
Citigroup Inc. (NYSE:C)'s chairman of Venture capital initiatives Deborah Hopkins said, “As people manage more and more aspects of their lives on digital and mobile platforms, cyber security is only going to become more important. ...
New England cybercenter opens
Dalje.com
The Advanced Cyber Security Center, an initiative of Mass Insight Global Partnerships, was opened Tuesday. The initiative enables operational, real-time data-sharing about advanced cyberthreats and establishes a platform for industry researchers to ...
Sotera Completes the Acquisition of Software Process Technologies, Inc.
Sacramento Bee
... revenue and its outstanding financial performance is driven by its unique solutions focus, leading edge technical expertise and direct exposure to programs addressing the pressing cyber security mission requirements of the Intelligence Community. ...
Russia: Cyber Security Code of Conduct? · Global Voices
By Alexey Sidorenko
The year of 2011 has turned out to be a hot season for the Russian Ministry of Foreign Affairs (MFA): the government is attempting to spread the system of Internet controls abroad - and the Russian bloggers interpret these attempts as either a ...
Global Voices
The Online Trust Alliance Announces “Why Your Browser Matters” in ...
By cybermaryland
GAITHERSBURG, MD, Sep 22, 2011 (MARKETWIRE via COMTEX) — NIST CybersecurityEducation Workshop — The Online Trust Alliance (OTA) today announced “Why Your Browser Matters,” a framework for websites to create “teachable moments” for site visitors, raising awareness of the security, ... Help us assess the cyber security industry in the state, catalog the cyber securitywork being performed throughout Maryland, and identify available services and service providers. ...
CyberMaryland

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com