NIST Makes Major Upgrade to SAMATE Reference Dataset

NIST Makes Major Upgrade to SAMATE Reference Dataset
Security Management
The SAMATE Reference Dataset (SRD) is a database that provides security developers with a set of known security flaws to consider when creating cybersecurity software. That database just got a lot larger. In a release on Tuesday, the National Institute ...
Ukraine and NATO to hold joint conference on problems of new challenges
Kyiv Post
"Next year we, together with NATO, will hold a conference on new threats, starting with security of energy supplies and finishing with cyber security. This event will be of great importance to our presidency of the OSCE from 2013, as some of these ...
Three TeleCommunication Systems Cyber Security Experts Appointed to Federal ...
Review seeker (press release)
... a world leader in highly reliable and secure mobile communication technology, today announced that three of its cyber security experts -- William Wells, technical fellow - delivery systems architecture; Dr. John Linwood Griffin, research fellow; ...
Businesses need to assume the worst when planning security
V3.co.uk
William Beer, director of the information security practice at PricewaterhouseCoopers, added that firms needed to ensure they have dedicated cyber security teams comprising the most technically savvy staff in the organisation. ...
Obama requests funds to expand cyber training
FederalNewsRadio.com
It may seem no agency can escape the fiscal chopping block these days, but one budget that won't see a cut anytime soon is cybersecurity. President Obama has requested $166.5 million to fight computer crime over the next year, and Congress has approved ...
DHS Finds No Evidence Hackers Penetrated Illinois Water Plant
Nextgov
A state fusion center report, first made public by reputable cybersecurity expert Joe Weiss, indicated that online intruders may have triggered a water pump failure. Still, some computer experts cautioned against jumping to conclusions about a ...
Irish biz servers rife with fake sites slurping victims' privates
Register
During the conference IRISSCERT announced that it had joined the International Cyber SecurityProtection Alliance (ICSPA). ICSPA is a global not-for-profit organisation that provides technical expertise and other resources to law enforcement agencies ...
VIASAT UK LAUNCHES HIGH-CAPACITY, LOW-COST COMMUNICATIONS FOR MILITARY ...
Prfire (press release)
About ViaSat UK: ViaSat produces satellite and other communications products that enable fast, secure and efficient communications anywhere, anytime. ViaSat UK designs, develops and  produces cyber security and information assurance solutions for ...
Joint efforts needed to address global challenges
China Daily
"Traditional security issues such as conflicts, wars and territorial disputes still remain, while non-traditional issues like poverty, terrorism, proliferation of weapons of mass destruction, transnational organized crime, cyber security have also come ...
US Politicians Increasingly Voicing Concerns About China
Voice of America
"When you have the cyber security that the PLA [China's army - People's Liberation Army] has been involved with, those are great and major issues both morally and security wise that we've got to deal with now." Former Massuchusetts Governor Mitt Romney ...
Will new DHS cyber leader bring balance to the role?
FederalNewsRadio.com
By Michael O'Connell Mark Weatherford recently stepped into the role of deputy under secretary forcybersecurity at the Department of Homeland Security. Now, one cybersecurity expert has proclaimed the move as the start of "an era of greater balance in ...
Telecommuting is popular, so why not 'teleshopping'?
ZDNet (blog)
The state of cybersecurity will affect sentiment around online shopping. But it is becoming increasingly apparent that small businesses that don't have an e-commerce presence are missing out. Kick off your day with ZDNet's daily e-mail newsletter. ...
Is it too late to turn back the rising tide of cyber crime?
IT PRO
I am not the only one with this concern, James Alexander is cybersecurity partner at Deloitte and he insists that "information security across the TMT industry is a matter that requires C-level attention, and organisations must raise awareness of the ...
Guardians of cyberspace
Deccan Chronicle
He says, “I had an inherent curiosity about cyber security right from my college days. These days, people and organisations are very concerned about security breaches and consequently this is the right time for security companies to start operations. ...
Perry: Communist China 'Destined for the Ash Heap of History' – 35000 ...
CNSNews.com
“When you have 35000 forced abortions a day in that country, when you have the cyber security that the PLA (People's Liberation Army) has been involved with, those are great major issues both morally and security-wise that we've got to deal with now,” ...
Unified storage and cloud computing to aid data ma...
Experian QAS Data Quality News (UK)
Mark Dempster, Associate of the Centre for Cyber Security, said recently that many companies are unaware that they have a problem with data security, meaning they are not prepared to prevent mishaps from occurring going forward.
ORR's top 10 operational risk concerns in 2012
Risk.net
The UK government and others are now intent on securing 'national infrastructure', which could include automatic teller machines and payment systems, against attack, with cyber-securityidentified as a national priority. And an online attack that ...
The Spam-Slinging Habits of China's Internet Water Army
The Atlantic Wire
They haven't been able to trace the activity to specific users very well — they do know that there are clandestine companies that support the practice — but the behavior patterns of the paid posters are fascinating and might help cyber security firms ...
Cyber Security Summit 2011 | News | PenTest Magazine
By Maciej Kozuszek
This summit will give you key insights into how your company can keep one step ahead of the ever-changing threat of cyber crime. 20+ industry experts will | Cyber Security Summit 2011 | The only magazine devoted exclusively to penetration ...
PenTest Magazine
Webinar: ICS Cyber Security in Water Control Systems
Webinar: ICS Cyber Security in Water Control Systems Trusted Metrics is hosting a monthly webinar series on Industrial Control System (ICS) Cybersecurity. Each session will speak to the issues faced by those operating and building industrial ...
Infosec Island Latest Articles
Belarc.com - Belarc, software license management, asset ...
Customers use our products for software license management, IT asset management, network inventory, hardware refreshes, cyber security, information assurance, and more. Url.http://belarc.com. Keywords. software license management ...
Pezis.com - Information and Reviews...
GOP candidates rush to mention cybersecurity in debate closing ...
By Russian Opinion
Several GOP presidential candidates rushed in the last minutes of Tuesday evening's CNN-sponsored national security debate to address an issue not otherwise.
World News - Russian opinion
Why Internet Security Software Is Essential for Your Computer
If you want to use the internet uninterruptedly and safely, the best way to get protection is through getting the best of the best cyber security software. Getting such software installed can help your computer by eliminating spyware, adware, ...
Latest Articles on EzineMark.com
Cybersecurity jobs more varied, numerous than most think ...
Ernest McDuffie, who oversees the National Initiative for Cybersecurity , joined the Federal Drive with Tom Temin and Amy Morris to provide an update on how ...
www.federalnewsradio.com/?nid=364&sid=2642931
Tear down cybersecurity silos, says David Blunkett
Cybersecurity efforts are still taking place in silos, and this needs to change if any ... says David Blunkett MP, chairman, International Cyber Security Protection ...
www.computerweekly.com/.../Tear-down-cyber-security-silos-...
Central America, Cyber-Security and Electromagnetic Pulse Attack ...
Central America, Cyber-Security and Electromagnetic Pulse Attack Identified As ... when you have the cybersecurity that the PLA has been involved with, those ...
cnsnews.com/.../central-america-cyber-security-and-electroma...
TOP TEN 10 CYBER TIPS FOR SMALL BIZ (2)
However, businesses need cybersecurity tools and tactics to protect themselves, their ... Here are ten key cybersecurity tips for businesses to protect themselves: ...
h71036.www7.hp.com/.../FCC-cyber-stragegies-for-small-busi...
Cyber-security guidelines for automation networks | Control ...
ODVA's guidelines document, Securing Ethernet/IP Networks, outlines plans and strategies forcyber-security in automation networks. See four ways to mitigate ...
www.controleng.com/search/search.../06c2d59f7e.html

Be Careful When Sharing Personal Info, Cybersecurity Malaysia Advises Online ...
Bernama
KUALA LUMPUR, Nov 24 (Bernama) -- CyberSecurity Malaysia today advised online shoppers to be careful when sharing personal information online as cyber security attacks are on the rise. Chief Executive Officer Prof Datuk Husin Jazri said between January ...
101 - Cyber security
FM.co.za
Why has cyber security become such a big concern and is it only a concern for governments? Why has cyber security become such a big concern? Organised crime's growing involvement in computer- related crime means the nature of those looking to hack into ...
IS military funds cybersecurity project
UPI.com
23 (UPI) -- The US Defense Advanced Research Projects Agency is funding a cybersecurity system project by Critical Assets Labs. The project is called "Pin Pad Defender," and the DARPA contract supports the continued development, fabrication and ...
Centerprise sees 250% uplift in sales of Becrypt cyber security products
SourceWire (press release)
Centerprise International, a major supplier to the Ministry of Defence through the Information Equipment Communications (ICS) catalogue has dramatically increased sales by 250% of Becryptcybersecurity products within its portfolio. ...
Stop Online Piracy Act (SOPA) and Cybersecurity Issues
The Epoch Times
Opposition to the bill was fueled by new findings that SOPA could harm cybersecurity—among the concerns raised by Holleyman. The findings were outlined by Leonard Napolitano, director of the Center for Computer Sciences & Information Technologies, ...
Cyber Security: A Global Effort
GovExec.com
State-sponsored cyber attacks appear to be on the rise, afflicting federal, state, and local government agencies, as well as major corporations. Stepping up its commitment to fighting on this new frontier, the United States recently joined the NATO ...
Online fraudsters could finally get their comeuppance
Telegraph.co.uk
The publication of the updated cyber security strategy tomorrow and the creation of the national cybercrime unit, could hopefully mean that online fraudsters finally get their comeuppance, writes Christopher Williams. Foreign Secretary William Hague ...
Cyberattacks a top national security concern, GOP candidates say
Computerworld
The third Republican candidate to raise cybersecurity as an issue in response to the question was current Texas Gov. Rick Perry. In comments stating his belief that China was destined for the "ash heap" of history, Perry said that the People's ...
MPs fear government could duplicate cyber efforts
Public Service
With intelligence agencies, law enforcement bodies and Whitehall departments involved in cyber security, the government must protect against possible duplication, MPs have again warned, ahead of the imminent launch of a new government cyber security ...
DHS expects 243 researchers to access cyber data through its PREDICT program
Government Security News
The concept behind PREDICT is to facilitate the flow of data among participants to enable them to develop new models, technologies and products that support more effective threat assessments and enhanced cyber security capabilities. ...
Concerns for information security in South Korea
The Korea Herald
This obviously increases the potential risks of cyber security and privacy on the Internet for businesses. According to a survey in 2010 from the Korea Internet & Security Agency, Korean businesses seem in grave danger of information security ...
House Intel chairman to unveil cyber bill next week
The Hill (blog)
will discuss his upcoming bipartisan cybersecurity legislation at an event sponsored by telecom industry groups on Nov. 30. Last week, Rogers decried the growing threat of "cyber espionage" from Chinese hackers intent on stealing US firms' trade ...
Poland EU Presidency - European Union and US discuss cybersecurity
ISRIA (registration)
The development of joint undertakings designed to fight cybercrime and boost cybersecurity was the subject of an EU-US Justice and Home Affairs Ministerial Meeting in Washington on 21st November. The gathering was hosted by US Attorney General Eric ...
SUNY Orange to participate in interactive HVEC open house on Nov. 30
Warwick Advertiser
The open house will provide interested prospective students with information on degree programs in fire protection technology, green building maintenance and management, wind turbine technology,cyber security and emergency management. ...
The war over SCADA: An insider's perspective on hype and hyperbole (repost)
CSO (blog)
To date, cybersecurity issues have had no impact on those metrics in North America. This is not to deny that there have been cybersecurity events within the industry, because there have been quite a few, but none have ever impacted the reliability ...
Grateful for the Internet and Those Saving It
Huffington Post (blog)
Despite warnings from cybersecurity experts, law professors and human rights groups, the entertainment industry managed to get plenty of co-sponsors and a hearing last week on HR 3261, called SOPA, with five supporters seated at the six-person witness ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com