Susan Crawford: Cybersecurity requires patches

Cybersecurity Requires Patches, Not a Vast Bill: Susan Crawford
BusinessWeek
29 (Bloomberg) -- When cybersecurity problems arise, the best response is to adopt a patch as soon as it's available. You don't want to wait for an entirely new operating system to be created, and you really don't want to use such a system until it has ...
Booz Allen Reports Top Ten Cyber Security Trends for Financial Services in 2012
MarketWatch (press release)
"These trends highlight the fact that cyber security today is about living with and managing the risk in your network. It's more than just preventing security violations," said Bill Wansley, senior vice president at Booz Allen Hamilton. ...
UK Cyber-Security Strategy Beefs Up Defenses, Information Sharing
eWeek
The Cyber-Security Strategy will create a national digital crime investigative unit, a public-private hub to share cyber-threat intelligence and make it easier to report cyber-crimes. The United Kingdom outlined plans to secure critical infrastructure ...
White House, Congress Renew Cybersecurity Push
TechNewsWorld
"Some good news: just last week, we had a very encouraging meeting with a bipartisan group of Senators that ended with agreement to work together to enact cyber security legislation as soon as possible," said Howard Schmidt, cybersecurity coordinator ...
Kratos Partners With AlienVault to Enhance Cyber Security and Situational ...
MarketWatch (press release)
AlienVault is the developer of advanced cyber security products including the AlienVault Unified SIEM Solution, a complete Security Integration and Event Management (SIEM) platform that unifies management of critical security systems and processes ...
Cyber security must focus on users, not just attackers
TechJournal South
Now, researchers at the Maryland Cybersecurity Center have reaffirmed that security measures must aim at users, not just attackers. ”Users expose the network to attacks,” one said. In a unique collaboration, an engineer and a criminologist at the ...
Cybersecurity Demands Patches, Not Vast Bill: Susan Crawford
Bloomberg
By Susan Crawford Tue Nov 29 00:15:59 GMT 2011 Comments When cybersecurityproblems arise, the best response is to adopt a patch as soon as it's available. You don't want to wait for an entirely new operating system to be created, and you really don't ...
FCC Cyber Security Tips for Small Businesses
IT Business Edge (blog)
The FCC published a list of "Ten Cybersecurity Tips for Small Businesses" earlier this year, which you can access here (pdf). In case you haven't seen it, however, I've highlight the 10 pointers below with my take on the various tips and links for ...
Students win cyber-security challenge
UConn Daily Campus
With banking and business, as well as personal and national security information, being conducted online cyber-security and privacy is increasingly important. As the world's digital world continues to expand, cyber-security has become a career ...
Trend Micro and the International Cybersecurity Protection Alliance to ...
MarketWatch (press release)
Trend Micro is one of the principal sponsors and founding members of the ICSPA (InternationalCyber Security Protection Alliance), which is leading the event. ICSPA is chaired by the Rt Hon David Blunkett, MP and was established with the support of the ...
Charlie Miller, former hacker now working on cybersecurity
NATO Community
Charlie Miller is a former hacker who has become an information security consultant. He was invited to the conference on cyber conflict held by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn in June, where he talked about the ...
Cyber Security
WGBA-TV
By NBC26 News Team A new survey shows more people plan to shop using their tablet or smartphones. Experts warn that security software for mobile devices is far behind normal desktop computers. They say the best way to protect yourself is a password ...
FBI Gets $18 Million to Bolster Cybersecurity Training
GovInfoSecurity.com
Despite the admission by some FBI agents that they had meager networking and counterintelligence know-how, the bureau has demonstrated the ability to use its knowledge of cybersecurity techniques to move against cybercriminals. ...
Cyber Awareness: Your Responsibility
GovInfoSecurity.com
Those organizations include the National Cybersecurity Alliance, StaySafeOnline.org and the Department of Homeland Security's National Cyber Security Month, all of which aim at teaching the importance of being safe on the Internet, safe Internet ...
U.S. Military Chief: "We're under constant attack every day"
Examiner.com
Nov 28, 2011 On Monday, the new Chairman of the Joint Chiefs of Staff, General Martin Dempsey warned about the constant breaches to the nation's cyber-security and continued vulnerability to cyber-terrorism. US military officials have frequently warned ...
Ethical hacking contest at Amrita University
The Hindu
Amrita Centre for Cyber Security of Amrita Vishwa Vidyapeetham is conducting 'India Capture the Flag (InCTF)', an ethical hacking contest. It is to promote awareness about cyber security among students and hive them hands on experience in secure coding ...
Invincea Finishing 2011 With New Funding and Strong Momentum
MarketWatch (press release)
... the Fortune 100 -- Recognized Leadership: -- Invincea CEO Anup Ghosh was recently appointed as a member of the National Academy of Engineering's Naval Studies Board to contribute to the development of the US Navy's future cyber security strategies. ...
Twitter buys mobile security firm Whisper Systems
Digitaltrends.com
Twitter is likely about to get more secure with its newly announced acquisition of cybersecurity firm Whisper Systems. Twitter has purchased cybersecurity firm Whisper Systems, which is best known for its antivirus software for Google's Android mobile ...
Oculis Labs Joins Northrop Grumman Cync Program
MarketWatch (press release)
"Oculis Labs develops unique cyber-security products to protect personal, commercial and government computer systems from visual eavesdropping," said Bill Anderson, CEO, Oculis Labs. "Joining the Cync Program gives us a considerable business advantage ...
IEEE Experts Predict Smartphone Hacking Will Soar in 2012
PR Newswire (press release)
Dr. Madjid Merabti, an IEEE Senior Member and Professor of Networked Systems at Liverpool John Moores University, UK, says while the public has been trained to recognize cyber-security threats associated with their PCs and laptops, they do not see ...
MasterCard spent $580000 lobbying in 3rd quarter
CBS News
The payments processor also lobbied the federal government on legislation involving the fees charged to merchants for processing debit card purchases, issues related to financial privacy, data security and cybersecurity, and market access issues in ...
Day in pictures: 29 November 2011
BBC News
He met Herman Van Rompuy (left) and Jose Manuel Barroso (right) at the White House in a discussion that covered US-EU trade ties, foreign aid and cybersecurity. In Germany, police watch over anti-nuclear protesters as lorries carrying nuclear waste ...
No evidence of hacking at Illinois water plant, says DHS
Fierce Homeland Security
In a bulletin (.pdf), DHS says US-CERT and FBI cybersecurity teams sent to the water plant near Springfield, Ill. found no evidence of cyber intrusions, nor any evidence that plant credentials were stolen, or that the vendor was involved in malicious ...
Holiday shopping online: How to avoid the '12 cyber scams of Christmas'
Christian Science Monitor
With more Americans turning to the Internet for more of their holiday shopping needs, good cybersecurity is vital to avoid a raft of scams – from promises of "free iPads" to "holiday screensavers" that install malware on your computer. ...
Fraud survey reveals extent of cyber crime
SC Magazine UK
William Beer, director of cyber security services at PwC, said: “Organisations face serious threats from cyber criminals from within as well as outside. It is clear that senior executives need to take these risks more seriously. ...
Control systems, incident reporting and online news
Intelligent Utility
I discuss it here because the narrative arc maps directly to the power sector and its concerns aroundcyber security in the age of grid modernization. This narrative is likely to be repeated in the near future until it resembles the first half of the ...
US vulnerable to cyber attacks: Military chief
Times of India
The comments by General Martin Dempsey, chairman of the Joint Chiefs of Staff, were the latest by US military officials flagging cyber security as an area of growing focus and investment even as the Pentagon braces for declining budgets. ...
IP Protection Bills Threaten Internet
GovInfoSecurity.com
The Brooking Institute's Allan Friedman says bills before Congress aimed at protecting intellectual property threaten cybersecurity. The Senate's Protect IP Act (S 968) and the House's Stop Online Privacy Act (HR 3261) will not "break the Internet" but ...
North Korea trains sights on Blue House
Asia Times Online
AP quoted November 8, 2011, Richard Clarke, a top adviser to three presidents for cybersecurity, as warning against going to war with North Korea: Clarke said if he was advising the president he would warn against attacking other countries because so ...
Commentary: Private Sector Neglects Cyber Security | The National ...
By Amitai Etzioni
One major reason the United States is subject to damaging cyber raids is that significant segments of the business community refuse to erect much-needed cyber defenses. Such defenses cannot be limited to the public sector because much of ...
The National Interest
UK: Cyber- Security Strategy: Government Lays Out Details Of Its ...
By Mikhail Doroshevich
The government plans to use GCHQ resources and expertise to ensure the UK private sector has a robust cyber-security strategy in place and is protected from malicious attacks. This is one of the many pronged approaches the government ...
Information Policy
UK must get its cybersecurity act together, says David Blunkett ...
By Blackmere
The government is paying lip service to cybersecurity, yet cutting essential services at the same time, says David Blunkett, MP and chairman of the International Cyber Security Protection Alliance. With the publication of the new national ...
Blackmere Consulting
DHS wins national cybersecurity award for DNSSEC work ...
By Graveline
The SANS Institute, which operates the Internet Storm Center, has awarded the 2011 U.S. NationalCybersecurity Innovation award to the U.S. Department of Homeland Security's Cyber SecurityResearch & Development Center. The center is ...
DNSSEC Deployment Initiative
White House, Congress Renew Cybersecurity Push | Knowledge ...
By John K. Higgins
In a rare showing of bipartisanship, members of Congress and the White House are trying to breathe new life into the effort to enact national cybersecurity legislation. In a recent flurry of activity, mainly between the Obama administration and ...
Knowledge Hub Networks
UK Government's new Cyber Security Strategy - Electronic ...
By Panos Korkovelos
The Uk Government has published its new Cyber Security Strategy, under which it "sets out how the UK will support economic prosperity, protect national security and safeguard the public's way of life by building a more trusted and resilient ...
Electronic Communications Regulation...
Intellect Blog » Blog Archive » UK Cyber Security Strategy 2.0
By Gordon Morrison
The much anticipated new version of the Cyber Security Strategy is finally out. But is it any good? Well, generally its reception has been good and, from an Intellect point of view, we support it. In particular, Intellect was very pleased to see some ...
Intellect Blog
ED FSA Software Developer's Conference Focuses on Theme of ...
By EDUCAUSE | Blogs
The U.S. Department of Education (ED) Federal Student Aid (FSA) Software Developers Conference kicked off today with sessions on cybersecurity, identity management, and related topics of trust and identity in cyberspace. The event ...
Janus University Blog
No posting for a couple of weeks - Terry Zink's Cyber Security Blog ...
By tzink
A blog about fighting spam and malware by a member of Microsoft Forefront Online Security anti-spam team.
MSDN Blogs
Private sector inherent to U.K. cybersecurity strategy - IT Compliance ...
By Ben Cole
Federal governments all over the world have become increasingly hands-on with cybersecuritystrategy and online privacy, but businesses have sometimes been critical of new rules that they say will hurt their bottom line. Look at the ...
IT Compliance Advisor
MEF hosts Seminar on eCrime | Isle News : Isle of Man
By Jamesq
The event was well attended by industry participants, David Butterworth of Skanco Business Systems Limited commented; “People with Cybersecurity skills are in short supply and the Isle of Man has the opportunity to address that gap, to the ...
Isle News : Isle of Man
Trend Micro and the International Cybersecurity Protection Alliance ...
Trend Micro and the International Cybersecurity Protection Alliance to Establish ... (InternationalCyber Security Protection Alliance), which is leading the event. ...
trendmicro.mediaroom.com/index.php?s=43&type...
The Federal Energy Regulatory Commission's Unclassified Cyber ...
The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01. The Federal Information Security Management Act of ...
energy.gov/.../federal-energy-regulatory-commissions-unclassi...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com