Top Spy Website Hacked

Top Spy Website Hacked
Daily Beast
On Wednesday, 48 hours after releasing a policy paper on cybersecurity, the top trade association for intelligence contractors got a first-hand lesson on the subject: they discovered that their website was hacked. Cryptome, a site affiliated with the ...
Electricity Sector Cybersecurity Risk Management Process Guideline
Insurance News Net (press release)
SUMMARY: The Department of Energy (DOE) invites public comment on DOE's intent to publish the Electricity Sector Cybersecurity Risk Management Process Guideline. The guideline describes a risk management process that is targeted to the specific needs ...
U of M Hosts Cyber Security Summit
KSTP.com
The first annual Cyber Security Summit, hosted by the Technology Leadership Institute, will feature leaders from the government, business, and non-profits, who will talk about security issues and the growing number of cyber attacks in the country. ...
The SEC Starts Talking About Cybersecurity
JD Supra (press release)
Chairman Schapiro stated that existing disclosure requirements already impose a requirement that reporting companies disclose information regarding cyber security risk. The first requirement cited by the Chairman was Item 503(c) of Regulation SK—Risk ...
Maryland Public Policy Institute Paper Calls for Creation of Cyber Security ...
Citybizlist (press release)
Martin O'Malley announced an initiative to make Maryland the "epicenter" of the growing field of cyber security. In "Making Maryland the 'Epicenter' of Computer Science Online Learning," released today by the Maryland Public Policy Institute, ...
Substituting cyber reporting with continuous monitoring carries risks
Nextgov
By Aliya Sternstein 09/16/2011 An Obama administration decision to relax agency reporting rules for complying with cybersecurity mandates by instead requiring automated data feeds about threats could relegate risk management to a back-office function ...
CNI cyber threat 'requires effective strategy'
Hostway
The Cyber Security and the UK's Critical National Infrastructure document suggests that the increase in illegal activity carried out over the internet could pose as a substantial concern to the government, but can not be met by politicians alone. ...
How Best Practices Put IT at Risk
GovInfoSecurity.com (blog)
At a House Financial Services Committee hearing on Wednesday, the top cybersecurity official at the Department of Homeland Security testified that the government is working to share its knowledge with industry through new, collaborative programs. ...
Intelligence Alliance Site Hacked
GovInfoSecurity.com
It is not a coincidence that this incident happened just two days after INSA'sCybersecurity Council released a report documenting the need for government and the private sector to begin to work together to solve our nations cyber security ...
Small Business Next Cybercrime Target
Kansas City infoZine
Schaffer said his department will work with individuals in October, which is Cyber SecurityAwareness month, and will begin the “Stop. Think. Connect.” campaign aimed at raising individuals' awareness. The Senate Judiciary Committee held a hearing ...
Russinovich: Prepare for cyber-attack
Newsday (subscription)
OpEd Newsday > Opinion > OpEd Russinovich: Prepare for cyber-attack Published: September 16, 2011 5:38 PM By MARK RUSSINOVICH Mark Russinovich, a cyber-security and Stuxnet expert, is the author of "Zero Day," a novel that portrays the collapse of the ...
US, Australia Tackle 21st-century Challenges
Department of Defense
The joint statement on cyber security sends a strong signal about the two nations' commitment to work together to counter and respond to cyber attacks, Panetta said. “This is the battlefield of the future,” the secretary said, “and our ability to work ...
FERC Proposes Revisions To Reliability Standards
Renew Grid
(NERC) to continue developing an approach to assure the grid can withstand a cybersecurityincident, according to FERC. The new standard would replace the existing risk-based assessment methodology for identifying critical assets with 17 uniform ...
DHS Outlines New Monthly FISMA Compliance Requirements
Dark Reading
One of them calls for agencies to establish monthly data feeds to CyberScope, a compliance tool developed to help the feds to better and more actively monitor cybersecurity. The tool was announced in late 2009 under then US CIO Vivek Kundra, ...
Criminal Charges Possible For Cop In Facebook Scandal
KITV Honolulu
"HPD is among the thousands, tens of thousands of other agencies, not only law enforcement, but government, military, private sector, they try to grasp technology, social media including, and the internet,” said Chris Duque, a cyber security expert who ...
Jockey Club's Wilson to discuss McKinsey study at simulcast conference
Thoroughbred Times
The conference's opening speaker will be cybersecurity author Joseph Menn, who wrote Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. Also featured will be presentations and discussion on innovations in types of ...
Anonymous Comes Out In The Open
NPR
says Rasch, who is now director of cybersecurity and privacy at the Falls Church, Va.-based consulting firm CSC. And Levinson points out that "it's easy to do things online; it's hard to get people into the same physical space for a protest. ...
Government Fellowship Program Accepting Applications
GovExec.com (blog)
"We need every type of professional -- accountants, cybersecurity experts, engineers, and many more -- in addition to our great public affairs and public administration students. PMFs can make a big impact quickly." As the PMF program plays a role in ...
Q&A: Janet Napolitano on managing the nation's third largest government agency
Madison.com
It covers immigration, cybersecurity, disaster preparation, response and recovery. That's a lot to do. And the agency is also very new. It's 8 years old. In government terms, that is an infant. This past spring we had multiple disasters occurring ...
Hidden hackers rewriting Hollywood's script
New Zealand Herald
"Once they get into someone's network they can do a lot of damage," said Mark Russinovich, acyber security expert and technical fellow at software giant Microsoft. Hollywood studios often force journalists and reviewers to sign non-disclosure ...
BCS members cite information security as the most important skill
ComputerworldUK
Thilthorpe said the continued expansion of online business opportunities was driving the need for information security, assurance and cyber security skills. He said organisations "needed to understand information and have an approach to risk ...
PricewaterhouseCoopers | Prepare for cyber threats targeting utilities and ...
Linex Legal (press release) (registration)
This PwC paper examines the cost of a security breach beyond data loss or service disruption and outlines the elements of a mature cyber security program to protect critical infrastructure against the continuous threat of compromise.
Liveblogging Session 1 – Opening Remarks and Panel 1: “What Can and Cannot Be ...
Lawfare (blog)
In addition, there are very rich companies that must step up and put in more efforts at prevention, whether it's dealing with cybersecurity or environmental disasters. We must be more creative so that the costs do not fall just on the taxpayers. ...
Cyber Security Week | SiliconANGLE
By John Casaretto
Monthly Security reports were mandated by the Federal Information Security Management Act this week by means of a compliance tool known as Cyberscope, designed to help federal agencies monitor cybersecurity. “Indeed, CyberScope ...
SiliconANGLE
Kristin Judge: Michigan Cyber Security Summit | Lucy Ann Lance ...
By editor
There are security measures you can implement to stay safe online, and the upcoming MichiganCyber Security Summit will address a wide range of cyber security issues for families, businesses, educators, government, law enforcement, and even information technology experts. The all-day event on October 7 is being hosted by Michigan .... Register online at http://washtenawcybercoalition.org. Visit www.michigan.gov/cybersecurity for more resources to help you stay safe online. ...
Lucy Ann Lance Show
Q&A with Kristin Judge on upcoming Michigan Cyber Security ...
By U.S. Dept. of Homeland Security - Staff Correspondent
Q&A with Kristin Judge on upcoming Michigan Cyber Security Summit in YpsilantiAnnArbor.comJudge: We're very excited to be the national kick-off for October Cyber Security Awareness Month. We have invited US Department of Homeland ...
PCHC International Institute
Cybersecurity News: Antisecurity Groups Plan Occupation of Wall St ...
By admin
What's Going On? The hactivist group that goes by the name "Anonymous" has collaborated with the group Adbusters to organize their nonviolent.
Legal News Directory
Facebook Felony bill amended; lying online not felonious
By Andrea Parrish
Changes to a 1980's-era cybersecurity law would have made it a felony to lie on Facebook, but the bill has already been amended. ... Statues for cybersecurity have been used in the past to prosecute bullies but only in extreme cases. What this means for you. No matter how this update to cyber security fares in Congress, the focus on online identity and security is definitely increasing. In 2009, the Justice Department prosecuted a woman for creating a fake profile on MySpace. In 2010 ...
NewsyType
Cyber security added to US-Australia pact - Technology & science ...
U.S. and Australian officials will cooperate on cyber security as part of their defense treaty, the first time the Obama administration has carved out that kind of ...
www.msnbc.msn.com/.../cyber-security-added-us-australia-tre...
Smaller Firms Outsource Cyber Security - Wall Street Journal
Ever-more fearful of cyberattacks, small and medium-size companies, the biggest chunk of U.S. enterprise, are starting to outsource their security to protect ...
online.wsj.com/.../3528CCAB-C88F-4717-87B4-9DEE3364C...
PC Training: Technology + Awareness = Cybersecurity
ESET Cybersecurity Training for Windows - Training.
go.eset.com/us/training/win
Utilities increasingly focus on cyber security measures
Still, Bochman contends many utilities are working to improve cyber security safeguards, especially in the wake of the Stuxnet worm, responsible for the ...
www.subnet.com/.../utilities-increasingly-focus-on-cyber-secur...
Cybersecurity Training - YouTube
8:42. Add to. Securing Our eCity Cybersecurity Symposium -- S...by securingourecity47 views; Thumbnail 2:25. Add to. Cyber Security - The ...
www.youtube.com/watch?v=a81-0lZneDY

Q&A with Kristin Judge on upcoming Michigan Cyber Security Summit in Ypsilanti
AnnArbor.com
The Michigan Cyber Security Summit Friday, Oct. 7 is at the Ann Arbor Ypsilanti Marriott at Eagle Crest. No registration will be available the day of the event, due to security details. You can register online. Visit www.michigan.gov/cybersecurity for ...
Veracode to Participate in Multiple IT and Cyber Security Events in September
EON: Enhanced Online News (press release)
(EON: Enhanced Online News)--Veracode, Inc., provider of the world's only independent, cloud-based application risk management platform, today announced details of its participation at several high-profile North American IT and cyber security events in ...
Global Business - Cyber Security
BBC News
In this week's Global Business, Peter Day talks to cyber security experts about the risks we all face from the liberty that the internet provides. This week Peter Day asks how safe is Cyberspace? Mobile phones and social networking sites like Facebook ...
Energy Department Sets Roadmap For Secure Infrastructure
InformationWeek
The Roadmap to Achieve Energy Delivery Systems Cybersecurity outlines five strategies on which the government and private-sector organizations that own and control critical energy infrastructure should collaborate to create a secure and resilient ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com