Tight Budget? Look to the ‘Cloud’

Tight Budget? Look to the ‘Cloud’ - NYTimes.com:
By VIVEK KUNDRA Published: August 30, 2011
AS the global economy struggles through a slow and painful recovery, governments around the world are wasting billions of dollars on unnecessary information technology. This problem has worsened in recent years because of what I call the “I.T. cartel.” This powerful group of private contractors encourages reliance on inefficient software and hardware that is expensive to acquire and to maintain." . . . . cloud computing is often far more secure than traditional computing, because companies like Google and Amazon can attract and retain cyber-security personnel of a higher quality than many governmental agencies.

Cybersecurity Focus Increasing as Organizations Adopt New Computing Models
MarketWatch (press release)
/quotes/zigman/78627/quotes/nls/symc SYMC +1.12% today announced the findings of its 2011 State of Security Survey which explored the state of cybersecurity efforts in organizations of all sizes. For the second year in a row, IT said security is the ...
Kaspersky Lab Extends "IT Security for the Next Generation" Conference to the ...
MarketWatch (press release)
WOBURN, MA, Aug 31, 2011 (MARKETWIRE via COMTEX) -- Kaspersky Lab, a leading developer of secure content and threat management solutions and one of the world's leaders in cyber security, will expand its acclaimed international research conference, ...
Suspected North Korean cyber attack highlights dangerous "mist and haze ...
Indiana University
BLOOMINGTON, Ind. -- Media reports of a suspected North Korean cyber attack against a South Korean bank raise fresh concerns about threats to cybersecurity. However, according to an Indiana University Maurer School of Law cybersecurity expert, ...
Survey assesses local cyber security needs
The Huntsville Times - al.com
By Mike Kelley, 42 staff HUNTSVILLE, Alabama – A small company tucked away in the quiet of old downtown Madison, Pikewerks is at the center of the Cyber Huntsville effort to develop a local cyber security industry. Founder and President Sandy Ring ...
Cyberspace Threats Often Blur Government Agency Lines
SecurityNewsDaily
... Agency (NSA) should play a lead role in some situations — or even be directing allcybersecurity efforts — is still under debate. Rod Beckstrom, the first director of the Department of Homeland Security's National Cyber Security Center (NCSC), ...
NRC OKs N-plant's security program
The Daily News of Newburyport
By Angeljean Chiaramida Staff writer SEABROOK —The Nuclear Regulatory Commission recently approved a cyber-security plan for the Seabrook nuclear power plant meant to ensure the plant's protection against cyber attacks. According to the approval ...
Industrial Control Systems Security
PR Newswire (press release)
What are the key ICS cyber security risks and vulnerabilities that are not adequately mitigated? • What are the technologies mostly like to be purchased to improve security of ICS and SCADA networks? • How large is the ICS cyber security market and ...
Palo Alto's McLaughlin Says Hack Attacks to Get Worse
Washington Post
McLaughlin also discusses Palo Alto's firewall software and the outlook for corporate spending on cybersecurity. He speaks with Emily Chang on Bloomberg Television's "Bloomberg West." (Source: Bloomberg) (/Bloomberg) Correction: Clarification: SuperFan ...
Software firm to open office
Rochester Democrat and Chronicle
The new location at 4 Commercial St. comes as Mykonos earlier this year announced a partnership with Rochester Institute of Technology to jointly teach cyber-security issues. "Rochester is a very strategic location for Mykonos Software, enabling us to ...
Cimation to open 8000 square foot Denver Tech office
Denver Post
Klein said the Denver office will provide project management, communications design, control room management, cyber security as well as design and drafting services. Klein had been the instrumentation engineering manager at Audubon Engineering. ...
Sotera Secures Over $15 Million in Cyber & C4ISR Contract Awards to Support ...
MarketWatch (press release)
... solutions and services for national security agencies and programs of the US government, was recently awarded over $15 million to support several cybersecurity and C4ISR programs within the Space and Naval Warfare Systems Command (SPAWAR). ...
The Intelligence Report On Mantech International
istockAnalyst.com (press release)
Cyber Security involves protecting military, law enforcement, health, and other critical and classified networks from security threats. Global Logistics is just what it sounds like - supply chain management, maintenance of vehicles and equipment, ...
GAO: Conflicting orders have led to confusion over DoD's cyber strategy
The Hill
But help could soon be on the way in the form of a sweeping new cybersecurity strategy document being developed by the Joint Staff. It is called “Joint Test Publication 3-12,” and Pentagon officials say the document would consolidate guidance now ...
Washtenaw: Cyber Security
The Ann Arbor Chronicle
By Chronicle Staff StaySafeOnline.org, hosted by the National Cyber Security Alliance, posts a Q&A with Washtenaw County commissioner Kristin Judge about the Washtenaw County Cyber Citizenship Coalition, which Judge spearheaded. ...
Symantec Report Finds 92 Percent of Organizations Saw Losses from Cyberattacks
Web Host Industry Review (blog)
41 percent said cybersecurity is somewhat or significantly more important than 12 months ago. According to Symantec, 92 percent of companies saw losses from cyberattacks in 2011, down from 100 percent last year. The top three reported losses according ...
It's official: Hacking has been gamified
Washington Post (blog)
With cyber-security fast becoming something of an obsession in Washington, US agencies are racing — sometimes against each other — to hire code-savvy youngsters. Recruiters from the Defense Department, the National Security Agency and the Department ...
Tantus tapped for cybersecurity services
UPI.com
31 (UPI) -- The US government has given Tantus Technologies Inc. a Blanket Purchase Agreement for cybersecurity services, the company announced. The agreement came from the US General Services Administration and the Department of Homeland Security. ...
Second Opinion On Cramer's Homeland Security Call: Consider Check Point
Seeking Alpha
In my view, cyber security is a potentially more profitable subsector, one that benefits from private sector spending in addition to public. PC Magazine quotes a study that reports the costs associated with dealing with cyber crime went up 56% this ...
Report Cites Unresolved Gaps in US Security
Voice of America (blog)
It expresses concern about cyber security, and says there is a pattern of increasing terrorist recruitment in the US of individuals who act alone, or so-called “lone wolves.” It does note however that there have been improvements with the screening of ...
Tantus Technologies, Inc. Wins Blanket Purchase Agreement for Cybersecurity ...
RedOrbit
Tantus has a growing Information Security and Privacy Line of Business that has a proven track record of delivering Cybersecurity-related services. They are currently responsible for securing a range of mission critical data, systems, ...
North Korean Cyberattack on South Korean Bank Raises Cybersecurity Fears
International Business Times
Officials believe that North Korean hackers are responsible for a cyberattack on a South Korean bank, the latest incident to underscore the potential of rogue nations to wreak havoc with cyberwarfare. In April, an attack on the Nonghyup agricultural ...
Top cybersecurity concerns: Malicious code, employees run amok
PC Advisor
By Ellen Messmer | Network World US | 31 August 11 When 3300 information-technology professionals were asked about cybersecurity, they said malicious code attacks accounted for the main type of cyberattack their organizations suffered during the past ...
San Francisco's Mykonos Software to open office in Rochester
Rochester Democrat and Chronicle
The new location comes as Mykonos earlier this year announced a partnership with Rochester Institute of Technology to jointly teach cyber-security issues. “Rochester is a very strategic location for Mykonos Software, enabling us to gain access to a ...
National privacy oversight board remains dormant : 2011-08-30
Washington Times
Analysts say a host of national security issues — such as airport screening,cybersecurity policies and an upcoming Supreme Court case on whether law enforcement can attach a satellite tracking device without a warrant — would have benefited from ...
Booz Allen Hamilton Examines Evolution of Domestic Preparedness, Emergence of ...
defpro
Additionally, journalists are encouraged to: • Interact with cybersecurity tools and simulations from our Cyber Security Center. • Participate in the personal preparedness fair with local first responders, representatives from the American Red Cross, ...
Estonia - President Ilves met with British Secretary of State for Defence
ISRIA (registration)
... Toomas Hendrik Ilves discussed the continuation of the NATO air security mission in the Baltic states, military co-operation between Estonia and the UK in Afghanistan, joint ventures in the sphere of cyber security and the situation in Libya. ...
Morning Tech Wrap: HP, Facebook, Sony
Forbes
Facebook has paid out more than $40000 in the last three weeks to cyber security “bounty hunters” who have found bugs in its software, The Daily Telegraph reports. The three-week old project that Facebook is calling its “Bug Bounty Program” has already ...
Pentagon's cyber strategy is "confused"
TG Daily
Nevertheless, GAO analysts, Davi D'Agostino and Nelsie Alcoser say that a cybersecurity strategy document currently being formulated by the Joint Staff could help alleviate some of the confusion - if it is completed in a timely manner. ...
WTPF – The Business Forum for HR Professionals Releases 2011 Compensation Survey
PR Web (press release)
New this year, the survey includes information for some of the hottest growth areas including Cyber Security and Geographic Information Systems. Key users say the survey is constructed and designed to really support the compensation market information ...
Terror alert: cops survey insecure wi-fi connections, plan action
Indian Express
We conducted a meeting with the Internet service providers (ISP) and briefed them about their responsibilities and guidelines laid down by the government about cyber security. Notices have been issued to 60 unprotected wi-fi users. ...
UMBC Training Centers Named One of the 'Top Fastest Growing Companies' by Inc ...
PR Web (press release)
UMBC Training Centers reported 143 percent growth, largely attributable to increased training delivered to the federal government in areas such as cybersecurity, systems engineering and project management. Training Centers was founded in 2000 by UMBC, ...
IEEE Xplore® Digital Library Reaches Three Million Documents as Pace of ...
PR Newswire (press release)
... Mohsen Jafari, an IEEE member from Rutgers University, NJ; Paul M. Skare, an IEEE member from Pacific Northwest National Laboratory, and Kenneth Rohde from the Cyber Security Research and Development Department at the Idaho National Laboratory. ...
Bad guys grabbed a key to Google
Marketplace
He's a privacy and security researcher and graduate fellow at The Center for AppliedCybersecurity Research at Indiana University. He says, "The certificate system is hopelessly broken. We have far too many companies who are in a position to create ...
Information Management Resources (IMRI) and H2 Clipper Announce Strategic ...
MarketWatch (press release)
About IMRI -- IMRI was founded in 1992 to provide private industry and government the highest quality technology, cyber security and engineering services. Headquartered in Aliso Viejo, CA, IMRI, a Service Disabled Veteran Owned, ...
Seventh Annual East Tennessee CyberSecurity Summit Coming to ...
By Rebekah Winkler
The East Tennessee CyberSecurity Summit Committee will host the Seventh Annual East Tennessee CyberSecurity Summit on October 12 and 13 at the Hilton Hotel in downtown Knoxville. The conference is co-hosted by the University of ...
Tennessee Today
viaForensics on CompTIA cybersecurity panel – viaForensics ...
By lhaas
viaForensics' Andrew Hoog participated in a panel discussion: Cybersecurity in the Age of Mobility. Listen to the experts discuss new threats and vulnerabilities for cybersecurity created by mobility and how to promote technological innovation ...
viaForensics
Sotera Wins 5 SPAWAR Cybersecurity, C4ISR Awards; John Hillen ...
John Hillen, Sotera Defense Solutions. Sotera Defense Solutions has won more than $15 million in cybersecurity and C4ISR program contracts and award modifications with the Space and Naval Warfare Systems Command. “The breadth of ...
GovCon Wire
World Experts and Scholars Combat Cyber Security Attacks at NYIT ...
By New Jersey Technology Council
19, 2011) – Days after the country marks the tenth anniversary of the 9/11 attacks, NYIT will host its Cyber Security Conference to discuss cyber vulnerabilities and the latest measures to protect individuals and organizations against attacks. ...
New Jersey Technology Council News Wire
Windows XP on TSA laptops? TSA Dinged in Wireless ...
By admin
TSA Dinged in Wireless Cybersecurity Audit. August 31, 2011 By admin. via NetworkWorld. We've questioned whether or not IT departments are too slow to patch Windows, and then took a survey that basically told us what we know, that ...
CrucialPointLLC
One Minute Wonders: The impact of new technologies on ...
By bcattolica
Karl Smith, Head of Cyber Security Assurance Services, BT Global Services. Jim Tiller, Global Security Practice Head, ... One Minute Wonders: The impact of new technologies on cybersecurity. By Tara Savage, Senior Marketing Manager, ...
SecureThinking
MAKING THE SECURITY DATA HAYSTACK DISAPPEAR ...
By ICCSRam
... indications of future security issues to come. Join us at the International Conference on Cyber Security (ICCS 2012) to meet and learn more from David McQueeney, IBM's Vice President for Software as he discusses security analytics. ...
International Conference on Cyber...
GCSA boon for IT security sector | Malaysia
By lian.huang
PETALING JAYA: The proposed Global Cybersecurity Alliance (GCSA) is set to be a platform for Malaysia and other countries to exchange ideas and expertise that will lead to a better, more secure cyberspace. Cybersecurity Malaysia chief ...
Malaysia
Infosecurity (USA) - IT professionals fret about smart grid cybersecurity
A full 77% of IT professionals said that they are concerned about smart grid cybersecurity, according to a survey by nCircle.
www.infosecurity-us.com/.../it-professionals-fret-about-smart-...
National Cyber Security Alliance to Coordinate Data Privacy Day ...
The National Cyber Security Alliance (NCSA), a non-profit public-private partnership focused oncybersecurity awareness and education for all digital citizens, ...
www.educause.edu/blog/vvogel/.../234758
Collaborative Cybersecurity
Booz Allen's RightIT approach helps federal agencies reduce IT costs up to 40 percent and improve IT operations and services.
www.boozallen.com/.../Collaborative-Cybersecurity-in-a-Conn...
Northrop brings cyber security expertise to UAE
Leading global security company Northrop Grumman will showcase its cyber security expertise at a major summit to be held next month in Abu Dhabi.
www.tradearabia.com/news/DEF_204009.html
SecureInfo Awarded Blanket Purchase Agreement for Cybersecurity ...
GSA and DHS' Federal Network Security (FNS), an organization within the National Cyber SecurityDivision will directly oversee work performed under this BPA. ...
www.istockanalyst.com/.../secureinfo-awarded-blanket-purcha...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com