Anonymous retreats from Mexico drug cartel confrontation

Anonymous retreats from Mexico drug cartel confrontation ...
Threats to begin unmasking members of Zetas reined back as cartel rumoured to be hiring own security specialists for physical retaliation – as others question ...
www.guardian.co.uk/.../anonymous-zetas-hacking-climbdown

Cybersecurity Meets Location Technology at Rocket City Geospatial Conference
DirectionsMag.com (press release)
Cybersecurity threats originate somewhere and this year's Rocket City Geospatial Conference will convene a plenary session on how location technology will be used to identify and map attacks. The City of Huntsville's cybersecurity initiative, ...
WidePoint Corporation to Announce 2011 Third Quarter Financial Results on ...
MarketWatch (press release)
7, 2011 /PRNewswire via COMTEX/ -- WidePoint Corporation (nyse-amex:WYY), a specialist in wireless mobility management and cybersecurity solutions, announced today that it will be reporting 2011 third quarter financial results on November 14, 2011, ...
Law conference reveals 'fault lines' in global cyberspace and cybersecurity ...
Indiana University
But according to an Indiana University Maurer School of Law cybersecurity expert, the meeting revealed deep differences that make effective international cooperation on cyberspace andcybersecurity increasingly difficult. "The gap between the interest ...
ManTech shifts to intelligence, cybersecurity
Washington Post
Readying for reductions in war-related spending, Fairfax-based ManTech International is moving to strengthen its intelligence and cybersecurity offerings. The company's effort already has helped it score a major contract win, but analysts say the ...
EU, US participate in first joint cyber security exercise
Computer Business Review
A first joint cyber security exercise - Cyber Atlantic 2011 - between the European Union (EU) and the US, with the support of the EU's Network and Information Security Agency (ENISA) and the US Department of Homeland Security, was held on 03 November ...
EU and US Cyber Security Experts Join Forces to Test Defences
Backup Technology (blog)
EU and US cyber security officials have come together to find out how they would most appropriately co-ordinate their response to a hacking incident. This is the first time that such an event has taken place between the two governing bodies, ...
US Counts on the Cloud to Boost Cyber Security
CIO Insight
By CIOinsight Cloud computing will make the intelligence community more secure and efficient, according to Gen. Keith Alexander, head of the National Security Agency. Army Gen. Keith Alexander, head of the National Security Agency (NSA), discussed the ...
CRN Session Addresses Cyber Security
Electric Co-op Today
By Todd H. Cunningham | ECT Staff Writer Published: November 7th, 2011 Electric cooperatives that have not yet drafted a cyber security plan should get started without delay, a leading security expert advised participants in NRECA's Cooperative ...
The challenge: In three minutes, give the research agenda in cybersecurity.
Threatpost (blog)
That tells me there is a research grade result for cybersecurity that will be found to be parallel. In the 1990s, the commercial world pulled even with the military world in the application of cryptography. It is now doing the same with traffic ...
WW III.0: As Washington Renews Military Threats Against Iran, Cyber Attacks ...
Pacific Free Press
According to the Defense Department's FY 2012 budget proposal, "the Pentagon said it plans to spend $2.3 billion on cybersecurity capabilities." However, when NextGov "questioned why the Air Force's $4.6 billion 2012 budget request for cybersecurity ...
The Highlands Gets Tech Firm
Wheeling News Register
According to the company website, SAIC's programs include national security, health,cybersecurity, and energy and environment. Founded in 1969, SAIC is headquartered in McLean, Va., and has 41000 employees worldwide. The site also notes SAIC is ...
Starting to talk – the crucial point of William Hague's #LondonCyber summit?
Public Service
"There are parts of the government machine which are doing tremendous work in cyberspace in terms of government service delivery, third world aid, areas of cyber security and promotion of economic growth with all the stuff like tech city," says Duncan. ...
Network breached? Then report it – new SEC guidance on cybersecurity ...
Lexology (registration)
First, the guidelines themselves are not a binding instrument, though they refer to a number of pre-existing general disclosure obligations that can also apply in the case of a cybersecurity breach. Second, the SEC is wary of further compromising ...
Wombat Security Technologies Co-Founder to Speak at the eCrime Researcher's Summit
Benzinga (press release)
The presentation is part of a panel entitled, “Leveraging Consumer Behavior Better than the Bad Guys”, a topic that captures the essence of Wombat's suite of cyber security training products. With clients in sectors that include finance, government, ...
Smartphone users increasingly at risk from scams
Fresh Business Thinking
“More and more people are using their smartphone to transmit personal and financial information over the internet, whether it's for online banking, shopping or social networking,” said Francis Maude, Minister for Cyber Security. ...
Israel denies Anonymous cyber-attack to blame for websites failure
The Guardian
But Nitzan Miron, a former member of Matzov, the cyber security division of the Israeli military, responsible for defending networks from hackers, said the breakdown was "a really strange coincidence". Miron, now chief executive of 6Scan, ...
Obsidian Analysis, Inc. Was Awarded the Prime Contract to Plan and Execute the ...
DigitalJournal.com (press release)
“NLE 2012 is the first exercise of this size addressing cyber security—it will test government and private sector cyber security plans on an unprecedented scale and ultimately enhance preparedness for cyber threats.” Obsidian's NLE team includes ...
Vulnerabilities give hackers ability to open prison cells from afar
Ars Technica
"We validated the researchers' initial assertion… that they could remotely reprogram and manipulate [the ICS software and controllers]," Former National Cybersecurity and Communications Integration Center Director Sean P. McGurk, who left DHS in ...
GE and Juniper Networks to Develop Family of Rugged, Secure Network Appliances ...
MarketWatch (press release)
Cybersecurity is of great concern, as well as the coexistence of allied forces through mixed-nation battlefield engagements. This results in a requirement for purpose-built rugged routers with advanced security capabilities since commercially-available ...
Cyber-Attack Alert
Chemical & Engineering News
The report prompted a response from the American Chemistry Council, a major US industry trade association, stating that its members have spent nearly $10 billion to enhance facility, transportation, and cyber security since 2001. ...
Defense Minister Visits US, NATO
ERR News
Tomorrow, Laar will present a lecture on cyber defense at the Center for Strategic and International Studies, a think tank, which is holding a seminar on cyber security. At his meeting with Flournoy on Tuesday, Laar will discuss NATO spending and the ...
Bulgaria's Interior Minister on Official Visit to US
Novinite.com
According to the press release, the delegation also has planned meetings with John Brennan, Chief Counterterrorism Advisor to President Barack Obama, Howard Schmidt,Cyber-Security Coordinator of the Obama Administration, operating in the Executive...
DHS officials warn of effect of House-approved DHS cuts
Fierce Homeland Security
Should the budget cuts relative to the request submitted to Congress in February come to pass, HSARPA would have to stop funding cybersecurity and biodefense research and significantly cut down on Small Business Innovation Research awards, Benda said. ...
Today's Online Security Tips
The Atlantic
The larger societal issue is that it's the Wild West right now for nearly everything that involves cyber privacy and cyber security, and like the wild west of old (or at least of film), your only protection now is to take care of these issues yourself ...
Growing threats and budget cuts challenge US intelligence
WTOP
US private sector firms and cyber security specialists have reported an onslaught of computer network intrusions that have originated in China, but the IC (intelligence community) cannot confirm who was responsible." One of the most insidious potential...
Small Talk: Wolf Minerals goes hunting for tungsten in South-west England
The Independent
Endace chanced upon some good timing last Tuesday, with its first-half results coinciding with the London cyber-security conference that generated more than a few headlines last week. The company specialises in network monitoring products that allow ...
Naperville Illinois Renews Contract for Smart Meter Deployment Despite ...
MarketWatch (press release)
Smart meters have garnished worldwide controversy due to privacy, cyber security and mounting health concerns. Almost 30% of states in the US have groups that actively oppose the deployment of wireless smart meters. Just last week, utilities began ...
Rogers: Alabama crucial to homeland security
Opelika Auburn News
This advanced crime fighting is known as cybersecurity. At the beginning of this year, I was selected as chairman of the Subcommittee on Transportation Security. This subcommittee has jurisdiction over TSA. Most folks reading this, like I am, ...
David Abraham: 'Channel 5 thinks it's clever, but we're still the No 1'
The Independent
"There have been demonstrations around this building, attacks on our cyber-security and we've been defamed as a broadcaster in the Sri Lankan parliament and in the UN." It helps explain why Abraham is less concerned about the threat from Desmond and ...
DTE pursues interop for all
Intelligent Utility
Interoperability, of course, isn't just widget talking to widget under the hood; it ensures that major, customer-facing policies around cyber security, data privacy and security can be achieved as well. That requires utilities such as DTE Energy to be ...
NATO interested in cooperation with Ukraine: official
Shanghai Daily (subscription)
"Now, more than ever there is an opportunity for partnership between Ukraine and NATO, especially at a time when all countries face many challenges, such as the proliferation of weapons of mass destruction, cyber security, piracy, etc," said Natalia ...
Hidden Agenda Behind 'Occupy': Dump Obama, Install Romney
Axis of Logic
Our sources discovered the surveillance originates inside Anonymous, whose leadership is penetrated by operatives from Cheney's cyber-security program. Behind the smiling Guy Fawkes mask is the scowl of Dick Cheney. Soros-backed financial reforms will ...
Cyber criminals may target London 2012 Olympics computer systems: Expert
TruthDive
One of the UK's leading experts on cyber security have warned all traders, banks and financial institutions to act now to shore up systems against an attack next July. According to experts, the London Olympics is billed as the first “truly digital ...
Cyber Security
The LYNXeon™ Cyber Security Solution keeps your network secure by identifying threats on your network that you don't even know about. LYNXeon does this ...
www.21technologies.com/solutions/cyber-security/

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com