Susan Crawford: Cybersecurity requires patches

Cybersecurity Requires Patches, Not a Vast Bill: Susan Crawford
BusinessWeek
29 (Bloomberg) -- When cybersecurity problems arise, the best response is to adopt a patch as soon as it's available. You don't want to wait for an entirely new operating system to be created, and you really don't want to use such a system until it has ...
Booz Allen Reports Top Ten Cyber Security Trends for Financial Services in 2012
MarketWatch (press release)
"These trends highlight the fact that cyber security today is about living with and managing the risk in your network. It's more than just preventing security violations," said Bill Wansley, senior vice president at Booz Allen Hamilton. ...
UK Cyber-Security Strategy Beefs Up Defenses, Information Sharing
eWeek
The Cyber-Security Strategy will create a national digital crime investigative unit, a public-private hub to share cyber-threat intelligence and make it easier to report cyber-crimes. The United Kingdom outlined plans to secure critical infrastructure ...
White House, Congress Renew Cybersecurity Push
TechNewsWorld
"Some good news: just last week, we had a very encouraging meeting with a bipartisan group of Senators that ended with agreement to work together to enact cyber security legislation as soon as possible," said Howard Schmidt, cybersecurity coordinator ...
Kratos Partners With AlienVault to Enhance Cyber Security and Situational ...
MarketWatch (press release)
AlienVault is the developer of advanced cyber security products including the AlienVault Unified SIEM Solution, a complete Security Integration and Event Management (SIEM) platform that unifies management of critical security systems and processes ...
Cyber security must focus on users, not just attackers
TechJournal South
Now, researchers at the Maryland Cybersecurity Center have reaffirmed that security measures must aim at users, not just attackers. ”Users expose the network to attacks,” one said. In a unique collaboration, an engineer and a criminologist at the ...
Cybersecurity Demands Patches, Not Vast Bill: Susan Crawford
Bloomberg
By Susan Crawford Tue Nov 29 00:15:59 GMT 2011 Comments When cybersecurityproblems arise, the best response is to adopt a patch as soon as it's available. You don't want to wait for an entirely new operating system to be created, and you really don't ...
FCC Cyber Security Tips for Small Businesses
IT Business Edge (blog)
The FCC published a list of "Ten Cybersecurity Tips for Small Businesses" earlier this year, which you can access here (pdf). In case you haven't seen it, however, I've highlight the 10 pointers below with my take on the various tips and links for ...
Students win cyber-security challenge
UConn Daily Campus
With banking and business, as well as personal and national security information, being conducted online cyber-security and privacy is increasingly important. As the world's digital world continues to expand, cyber-security has become a career ...
Trend Micro and the International Cybersecurity Protection Alliance to ...
MarketWatch (press release)
Trend Micro is one of the principal sponsors and founding members of the ICSPA (InternationalCyber Security Protection Alliance), which is leading the event. ICSPA is chaired by the Rt Hon David Blunkett, MP and was established with the support of the ...
Charlie Miller, former hacker now working on cybersecurity
NATO Community
Charlie Miller is a former hacker who has become an information security consultant. He was invited to the conference on cyber conflict held by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn in June, where he talked about the ...
Cyber Security
WGBA-TV
By NBC26 News Team A new survey shows more people plan to shop using their tablet or smartphones. Experts warn that security software for mobile devices is far behind normal desktop computers. They say the best way to protect yourself is a password ...
FBI Gets $18 Million to Bolster Cybersecurity Training
GovInfoSecurity.com
Despite the admission by some FBI agents that they had meager networking and counterintelligence know-how, the bureau has demonstrated the ability to use its knowledge of cybersecurity techniques to move against cybercriminals. ...
Cyber Awareness: Your Responsibility
GovInfoSecurity.com
Those organizations include the National Cybersecurity Alliance, StaySafeOnline.org and the Department of Homeland Security's National Cyber Security Month, all of which aim at teaching the importance of being safe on the Internet, safe Internet ...
U.S. Military Chief: "We're under constant attack every day"
Examiner.com
Nov 28, 2011 On Monday, the new Chairman of the Joint Chiefs of Staff, General Martin Dempsey warned about the constant breaches to the nation's cyber-security and continued vulnerability to cyber-terrorism. US military officials have frequently warned ...
Ethical hacking contest at Amrita University
The Hindu
Amrita Centre for Cyber Security of Amrita Vishwa Vidyapeetham is conducting 'India Capture the Flag (InCTF)', an ethical hacking contest. It is to promote awareness about cyber security among students and hive them hands on experience in secure coding ...
Invincea Finishing 2011 With New Funding and Strong Momentum
MarketWatch (press release)
... the Fortune 100 -- Recognized Leadership: -- Invincea CEO Anup Ghosh was recently appointed as a member of the National Academy of Engineering's Naval Studies Board to contribute to the development of the US Navy's future cyber security strategies. ...
Twitter buys mobile security firm Whisper Systems
Digitaltrends.com
Twitter is likely about to get more secure with its newly announced acquisition of cybersecurity firm Whisper Systems. Twitter has purchased cybersecurity firm Whisper Systems, which is best known for its antivirus software for Google's Android mobile ...
Oculis Labs Joins Northrop Grumman Cync Program
MarketWatch (press release)
"Oculis Labs develops unique cyber-security products to protect personal, commercial and government computer systems from visual eavesdropping," said Bill Anderson, CEO, Oculis Labs. "Joining the Cync Program gives us a considerable business advantage ...
IEEE Experts Predict Smartphone Hacking Will Soar in 2012
PR Newswire (press release)
Dr. Madjid Merabti, an IEEE Senior Member and Professor of Networked Systems at Liverpool John Moores University, UK, says while the public has been trained to recognize cyber-security threats associated with their PCs and laptops, they do not see ...
MasterCard spent $580000 lobbying in 3rd quarter
CBS News
The payments processor also lobbied the federal government on legislation involving the fees charged to merchants for processing debit card purchases, issues related to financial privacy, data security and cybersecurity, and market access issues in ...
Day in pictures: 29 November 2011
BBC News
He met Herman Van Rompuy (left) and Jose Manuel Barroso (right) at the White House in a discussion that covered US-EU trade ties, foreign aid and cybersecurity. In Germany, police watch over anti-nuclear protesters as lorries carrying nuclear waste ...
No evidence of hacking at Illinois water plant, says DHS
Fierce Homeland Security
In a bulletin (.pdf), DHS says US-CERT and FBI cybersecurity teams sent to the water plant near Springfield, Ill. found no evidence of cyber intrusions, nor any evidence that plant credentials were stolen, or that the vendor was involved in malicious ...
Holiday shopping online: How to avoid the '12 cyber scams of Christmas'
Christian Science Monitor
With more Americans turning to the Internet for more of their holiday shopping needs, good cybersecurity is vital to avoid a raft of scams – from promises of "free iPads" to "holiday screensavers" that install malware on your computer. ...
Fraud survey reveals extent of cyber crime
SC Magazine UK
William Beer, director of cyber security services at PwC, said: “Organisations face serious threats from cyber criminals from within as well as outside. It is clear that senior executives need to take these risks more seriously. ...
Control systems, incident reporting and online news
Intelligent Utility
I discuss it here because the narrative arc maps directly to the power sector and its concerns aroundcyber security in the age of grid modernization. This narrative is likely to be repeated in the near future until it resembles the first half of the ...
US vulnerable to cyber attacks: Military chief
Times of India
The comments by General Martin Dempsey, chairman of the Joint Chiefs of Staff, were the latest by US military officials flagging cyber security as an area of growing focus and investment even as the Pentagon braces for declining budgets. ...
IP Protection Bills Threaten Internet
GovInfoSecurity.com
The Brooking Institute's Allan Friedman says bills before Congress aimed at protecting intellectual property threaten cybersecurity. The Senate's Protect IP Act (S 968) and the House's Stop Online Privacy Act (HR 3261) will not "break the Internet" but ...
North Korea trains sights on Blue House
Asia Times Online
AP quoted November 8, 2011, Richard Clarke, a top adviser to three presidents for cybersecurity, as warning against going to war with North Korea: Clarke said if he was advising the president he would warn against attacking other countries because so ...
Commentary: Private Sector Neglects Cyber Security | The National ...
By Amitai Etzioni
One major reason the United States is subject to damaging cyber raids is that significant segments of the business community refuse to erect much-needed cyber defenses. Such defenses cannot be limited to the public sector because much of ...
The National Interest
UK: Cyber- Security Strategy: Government Lays Out Details Of Its ...
By Mikhail Doroshevich
The government plans to use GCHQ resources and expertise to ensure the UK private sector has a robust cyber-security strategy in place and is protected from malicious attacks. This is one of the many pronged approaches the government ...
Information Policy
UK must get its cybersecurity act together, says David Blunkett ...
By Blackmere
The government is paying lip service to cybersecurity, yet cutting essential services at the same time, says David Blunkett, MP and chairman of the International Cyber Security Protection Alliance. With the publication of the new national ...
Blackmere Consulting
DHS wins national cybersecurity award for DNSSEC work ...
By Graveline
The SANS Institute, which operates the Internet Storm Center, has awarded the 2011 U.S. NationalCybersecurity Innovation award to the U.S. Department of Homeland Security's Cyber SecurityResearch & Development Center. The center is ...
DNSSEC Deployment Initiative
White House, Congress Renew Cybersecurity Push | Knowledge ...
By John K. Higgins
In a rare showing of bipartisanship, members of Congress and the White House are trying to breathe new life into the effort to enact national cybersecurity legislation. In a recent flurry of activity, mainly between the Obama administration and ...
Knowledge Hub Networks
UK Government's new Cyber Security Strategy - Electronic ...
By Panos Korkovelos
The Uk Government has published its new Cyber Security Strategy, under which it "sets out how the UK will support economic prosperity, protect national security and safeguard the public's way of life by building a more trusted and resilient ...
Electronic Communications Regulation...
Intellect Blog » Blog Archive » UK Cyber Security Strategy 2.0
By Gordon Morrison
The much anticipated new version of the Cyber Security Strategy is finally out. But is it any good? Well, generally its reception has been good and, from an Intellect point of view, we support it. In particular, Intellect was very pleased to see some ...
Intellect Blog
ED FSA Software Developer's Conference Focuses on Theme of ...
By EDUCAUSE | Blogs
The U.S. Department of Education (ED) Federal Student Aid (FSA) Software Developers Conference kicked off today with sessions on cybersecurity, identity management, and related topics of trust and identity in cyberspace. The event ...
Janus University Blog
No posting for a couple of weeks - Terry Zink's Cyber Security Blog ...
By tzink
A blog about fighting spam and malware by a member of Microsoft Forefront Online Security anti-spam team.
MSDN Blogs
Private sector inherent to U.K. cybersecurity strategy - IT Compliance ...
By Ben Cole
Federal governments all over the world have become increasingly hands-on with cybersecuritystrategy and online privacy, but businesses have sometimes been critical of new rules that they say will hurt their bottom line. Look at the ...
IT Compliance Advisor
MEF hosts Seminar on eCrime | Isle News : Isle of Man
By Jamesq
The event was well attended by industry participants, David Butterworth of Skanco Business Systems Limited commented; “People with Cybersecurity skills are in short supply and the Isle of Man has the opportunity to address that gap, to the ...
Isle News : Isle of Man
Trend Micro and the International Cybersecurity Protection Alliance ...
Trend Micro and the International Cybersecurity Protection Alliance to Establish ... (InternationalCyber Security Protection Alliance), which is leading the event. ...
trendmicro.mediaroom.com/index.php?s=43&type...
The Federal Energy Regulatory Commission's Unclassified Cyber ...
The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01. The Federal Information Security Management Act of ...
energy.gov/.../federal-energy-regulatory-commissions-unclassi...

UK gov's Cyber Security Strategy: friend or foe?

The UK government's Cyber Security Strategy: friend or foe?
SC Magazine UK
Friday saw the release of the government's Cyber Security Strategy that set out the UK's plans to build a more trusted and resilient digital environment. Work with ISPs to create a voluntary code of conduct to help people identify if their computers ...
How will the cyber security hub work? Experts explain
Computing
By Stuart Sumner The government last week announced the creation of a cyber security hub as part of its cyber security strategy. Here one industry insider explains how it will enable the sharing of information between the public and private sectors. ...
Cyber security threats: Will your enterprise be the next victim?
SearchSecurity.in
Cyber security threats are ubiquitous and devastating. In 2011 alone, companies such as Google and Sony have lost billions of dollars in market capitalization as an indirect outcome of cyber attacks perpetrated against them. ...
Cyber security team honored
Towerlight
Towson University's cyber security defense team spent its summer differently than what some may consider an average college student's summer, according to cyber team coach and Director of the School of Emerging Technologies Michael O'Leary. ...
Myricom Introduces Sub-$1K Timecode-based 10-Gigabit Ethernet Adapter for ...
MarketWatch (press release)
The 10G-PCIE2-8C2-2S-SYNC dual-SFP+-port adapter is specifically designed for applications such as cybersecurity and high frequency trading where accurate timestamping, lossless packet sniffing and injection at line rate, and cutting edge latencies are ...
Cyber-Security Threats Get More Sophisticated, Targets Individuals
Social Barrel
Cyber-security threats have evolved and businesses must learn from cyber-attacks used by Anonymous and LulzSec to create better security solutions, experts and speakers unanimously told attendees at a cyber-security panel discussion held on Thursday. ...
Weaknesses in US Cybersecurity Deterrence Strategy
Lawfare (blog)
by Jack Goldsmith I had an op-ed over the weekend arguing that last week's Defense Department report to Congress – which announced for the first time a policy of using offensive cyber weapons in response to threats or uses of significant cyber weapons ...
Myricom Aims Product At Trading, Cybersecurity
socalTech.com
Arcadia-based Myricom, the provider of high speed clustering and networking adapters, announced this morning that it has shipped a new, 10-Gigabit Ethernet network adapter specifically aimed at thecybersecurity and high frequency trading market. ...
Kratos Pays $17.5M for Cybersecurity Specialist
San Diego Business Journal
15 that it acquired a company that specializes in cybersecurity for $17.5 million in cash. The acquired company, SecureInfo Corp., is located in the Washington, DC, suburb of Reston, Va. The sellers may receive an additional $2 million if the company ...
Crash Podcast: SAP, 4G and the cyber security strategy
Computing
By Stuart Sumner In this week's Crash, we discuss the recent SAP user group conference, the upcoming UK 4G spectrum auction, and the government's new cyber security strategy. Crash is presented by Stuart Sumner, with Derek Du Preez and Dave Bailey. ...
Hackers Blow Up Illinois Water Utility…or Not
TIME
By Jerry Brito | @jerrybrito | November 28, 2011 | + A workstation is pictured at the US Department of Homeland Security's National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia. ...
Isle of Man could be worldwide centre of excellence in tackling internet ...
isleofman.com
THE Isle of Man is looking at the possibility of becoming a worldwide centre of excellence in “cybersecurity” to tackle internet crime and fraud. It follows the first presentation in a series of seminars on the Island by a new group which plans to ...
UK govt to ban criminals, cyber bullies from Net
Times of India
Criminals who commit offences online and cyber bullies will be banned from the internet as part of British government's new cyber security strategy. LONDON: Criminals who commit offences online and cyber bullies will be banned from the internet as part ...
UK government reneges on censorship-free web promise; Plans to ban 'cyber ...
ZDNet (blog)
The UK's cyber-security strategy released on Friday spells out the increased use of “cyber-sanctions”, where those who misuse the Internet for criminal means could be barred from accessing social networks, including Facebook and Twitter, ...
Editorial: Coordination needed to fight cyber terrorism
MassLive.com
By The Republican Editorials Associated PressThe National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va. It will take several more years for the government ...
OAS Organizes Best Practices Workshop in Bogota on Cyber Security and Cyber ...
ISRIA (registration)
The Organization of American States (OAS), though the Secretariat of the Inter-American Committee against Terrorism (CICTE), will organize a workshop on best practices in cyber security and cyber crime this November 28-30 in Bogota for representatives ...
Breach Notification Priority for 2012
BankInfoSecurity.com
BITS president Paul Smocer says banks can expect an uptick in cybersecurity-focused legislation in 2012. What impact will changes from Capitol Hill have on requirements for data breach notification, information sharing and critical infrastructure? ...
National security database gets underway
CIOL
The project will bring together experts and professionals with in-depth knowledge and expertise in the area of information and cyber security. “We aim to have a strong database of over one lakh professionals by next year,” Setty added. ...
Security measures 'must match up to data management needs'
Ontrack Data Recovery
Critical losses and breaches often occur through "staff choosing to manipulate the system", according to Centre for Cyber Security associate Mark Dempster. In order to reduce the risk of suffering lost data or recourse to complicated file recovery ...
Government launches cyber security hub pilot
CIO UK
By Anh Nguyen | Published: 07:16 GMT, 28 November 11 | Computerworld UK The government has announced a pilot of a cyber security 'hub' that will enable the public and private sectors to exchange information on cyber threats. ...
IL water system pump failure not cyber attack
Government Security News
The report backs earlier conclusions by DHS cyber security teams that the failure of the pump at Curran-Gardner Public Water District in Springfield, IL, wasn't the work of Russian cyber criminals or agents. The pump's failure in early November was ...
NASSCOM-DSCI Annual Information Security Summit 2011
Siliconindia.com
Supported by over 20 organizations, the Delhi Summit 2011 features leading authorities on Cyber Security & National Security, Mobility & Extended Organization, Data Centric Security, Cloud Computing, and Business Perspective of Security, as they engage ...
SOPA Opponents' Bogus Net Neutrality Comparisons
Forbes
Assuming the House SOPA definitions are fine-tuned to better target only the worst rogue websites and not ensnare innocent players, and assuming the amended SOPA bill avoids unintended technical, cyber-security or privacy problems from actual ...
Staying Safe on Cyber Monday
WHSV
That indicates that the website uses technology that encrypts your data. For more information on Cyber shopping safety tips, log onto www.dhs.gov and click on the Cyber security tab at the top of the page.
VicSuper opts for earthwave's threat management services to protect its ...
CSO Magazine
... a critical part of VicSuper's corporate governance framework and this agreement enables the not-for-profit company to augment its highly advanced security infrastructure by leveraging earthwave's expertise in threat management and cyber security. ...
LAPD wins GSN's 2011 award for “Most Notable Law Enforcement Counter Terrorism ...
Government Security News
The Counter-Terrorism and Special Operations Bureau was also named a finalist in the GSN awards competition in the category of “Most Notable Cyber Security Program or Technology -- Government or Military.”
UMBC CyberSecurity Group on LinkedIn · Community News ...
You are welcome to post information or inquires regarding:- CyberSecurity jobs, internships, events, interview tips, research, tech gossips/discussions, new trends, hot topics, and other technical domains that overlap with cybersecurity. ...
myUMBC News
How Do We Encourage Companies to Embrace Cybersecurity ...
By bcattolica
At the end of last month I had the pleasure of traveling to Washington, D.C. to speak at Booz Allen Hamilton's conference on the significance of the cybersecurity dilemma. For over 90 minutes the panel delved into the question of why most ...
SecureThinking
Cyber-Security Threats Get More Sophisticated, Targets Individuals ...
By Blackmere
Cyber-security threats have evolved and businesses must learn from cyber-attacks used by Anonymous and LulzSec to create better security solutions, experts and speakers unanimously told attendees at a cyber-security panel discussion ...
Blackmere Consulting
Britain Publishes its New Cyber Security Strategy | LIVE HACKING
By Ethical Hacker
Com) - The United Kingdom has published its new Cyber Security Strategy subtitled “Protecting and promoting the UK in a digital world.” The strategy comes after the UK hosted an International Cyber Security conference in London last month. ...
LIVE HACKING
The UK Cyber Security Strategy - News - All the information you ...
By PF
The UK Cyber Security Strategy. Date Monday, November 28, 2011 at 12:46.
Conference: 2nd Annual Cyber Security Summit, 11th – 12th April ...
By Angelika
Conference name: 2nd Annual Enterprise Cyber Security Summit From: 11.4.2012 To: 12.4.2012 Location: Prague, Czech Republic Venue: TBA Conference email: | Conference: 2nd Annual Cyber Security Summit, 11th – 12th April 2012, ...
IT Security Magazine - Hakin9...
UK Unveils New Cyber Security Strategy, Will Create New ...
By Steve Ragan
The Minister for the Cabinet Office and Paymaster General, Francis Maude, published a set of plans on Friday outlining the UK's goals over the next four years that will introduce sweeping changes to the nation's cyber security posture.
SecurityWeek RSS Feed
'Promising step' to cybersecurity | Zonkey Solutions
By Zonkey
International security programme, Chatham House. Hacking graphic The UK government plans “unprecedented co-operation” with businesses to improve cybersecurity. The UK government has today released its 2011 Cyber Security Strategy. ...
Zonkey Solutions
Deloitte: Comments On Strategy For UK Cyber Security | Big4.com
By Rob Starr, Big4.com
... head of UK cybersecurity at Deloitte, commented recently on the UK's Cyber Security strategy saying that cybercrime has become a more sophisticated and challenging global issue for governments, businesses and individuals to conquer.
Big4.com
Cyber Monday - Cyber Security Toolkit Special Offer | IT Governance ...
By kwright
Today is Cyber Monday, the biggest online shopping day of the year. To celebrate we have a fantastic offer on our cyber security toolkit. With cyber crime a growing issue, the US government is trying to ensure that cyber security is at the top of ...
IT Governance Blog on IT governance,...
UK government lays out cyber security plans - IT Secure Site
By admin
IT Secure Site - UK supervision lays out cyber confidence plans.
IT Secure Site
Myricom Introduces Sub-$1K Timecode-based 10-Gigabit Ethernet ...
Myricom SYNC dual-port 10GbE SFP+ adapter enables Lynx Capital Partners to more accurately measure and monitor the performance of its high frequency trading platform | Virtual Strategy Magazine is an online publication devoted entirely ...
Virtual-Strategy Magazine - Your...
Ping! Zine » Money and Glory – The Motives for Business Owners ...
By Ping! Zine Editor
Redi, whose website Zone-H archives hacking incidents, has worked in cyber security for more than eight years, observing the evolution of hackers and their motives. “In recent years I have seen the complete process of 'hacking-for-fun' evolve ...
Ping! Zine
Update: Industry welcomes government cyber security plan but ...
As the government unveiled its cyber security strategy, industry experts welcomed the strategy but questioned some of the specifics.
www.computerweekly.com/.../Industry-reaction-to-governme...
Are cybersecurity bachelor's degrees worth the time? | TechRepublic
Some are pushing the need for cybersecurity degree programs. But would those graduates lack the general IT skills necessary?
www.techrepublic.com/blog/career/are...bachelors.../3662
BBC News - UK cybersecurity plan a 'promising step' but with risks
UK cybersecurity plan a 'promising step' but with risks. David Clemente ... The UK government has today released its 2011 Cyber Security Strategy. With an ...
www.bbc.co.uk/news/technology-15893773
Accounting for Cybersecurity - (Part 2 of 4) - SourcingSpeak Blog
In Part One of this article, we looked at the Securities and Exchange Commission (SEC) Division of Corporation Finance's recent release - CF Disclosure ...
www.sourcingspeak.com/.../accounting-for-cybersecurity---pa...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com