2011 Cyber Security Strategy Released

2011 Cyber Security Strategy Released
Backup Technology (blog)
The UK government have re-evaluated their 2009 cyber security strategy and have released an up to date version. As the number of cybercrime attacks that have been reported has increased dramatically within the last decade; having an effective cyber ...
Fragmented efforts hurt cybersecurity workforce development
GCN.com
By William Jackson The weak economy has made it easier for at least some agencies to recruit and retain cybersecurity professionals, but government needs to do a better job of identifying and tracking these workers and of assessing the effectiveness of ...
Global Threats Trigger Sharp Rise In Cyber Security M&A -Study
Wall Street Journal
LONDON (Dow Jones)--Global cyber security deals have rocketed in volume and value over the last few years as companies and consumers alike are subject to growing threats, while changes in technology make growth imperative for companies in the sector, ...
No Austerity in Cybersecurity: Double-Digit Growth Predicted
National Defense Magazine (blog)
A new forecast for cybersecurity spending cements the industry's status as a growth sector, rather than a passing fad. The study, published Dec. 1, predicts more defense contractors will be scooping up information-technology companies in the coming ...
Nexon case shows lax cyber security
Korea Times
By Kim Tong-hyung Korea must have thought its computer security defense couldn't get any worse, but it did. Computer games publisher Nexon (www.nexon.com) earlier month was exposed as the latest online company here to allow cyber criminals to intrude ...
Cable backs cyber security bill
Communications, Engineering & Design Magazine
The House Intelligence Committee has introduced legislation aimed at improving the nation's cyber security by encouraging better communication between private industry and the federal government. The Cyber Intelligence Sharing and Protection Act of ...
Mobile heads Top Ten list of cyber security threats for financial services
TabTimes
A research report by Booz Allen lists mobile atop its Top 10 Financial Services Cyber Security Trends for 2012. The consulting giant notes that “the exponential growth of mobile devices drives an exponential growth in security risks. ...
Cable operators back cyber security bill
FierceCable
Cable lobbyists say they will support a cyber security bill that was introduced by the House Thursday which could see Comcast (Nasdaq: CMCSA), Time Warner Cable (NYSE: TWC) and other cable MSOs share information about traffic on their networks, ...
Social media in for worse cyber attacks in 2012, says report
Times of India
PUNE: Social media sites and cellphones will prove to be fertile grounds for cyber criminals to exploit globally important events in 2012 to steal personal information and data and make financial gains,cyber security firm Websense has said. ...
Cable, Telco Backed Cybersecurity Bill Introduced
Broadcasting & Cable
The door swings both ways, with the government expecting to get cybersecurity threat info from the private sector as well, which the government promises not to use "for regulatory purposes." It also immunizes the private sector from criminal or civil ...
Cyber security bill promotes sharing of threat data
CNN (blog)
Washington (CNN) - The House Intelligence Committee introduced legislation Wednesday designed to knock down the barriers that interfere with the federal government and the private sector sharing critical information about cyber security threats. ...
Unified Approach Key to UK and Global Cyber Security
ZDNet UK (blog)
Recently the UK government unveiled its cyber security strategy for the next four years on combating cyber crime and protecting the nation's growing internet economy. The focus is squarely on curbing cyber crime and cyber terrorism backed by an outlay ...
Ruppersberger, Rogers Introduce Cybersecurity Bill to Protect American ...
DirectionsMag.com (press release)
This cybersecurity bill goes a long way in helping American businesses better protect their networks and their intellectual property. ” American businesses are targeted every day by scheming hackers and nation-states such asChina and Russia that are ...
UK Government Communications Headquarters launches online recruitment campaign
HRmagazine.co.uk
Against the backdrop of the UK's new Cyber Security Strategy, published last week November 2011, the UK Government Communications Headquarters (GCHQ) has launched an online code breaker game to recruit new talent. GCHQ is one of the three UK ...
ASU Magazine features Project Humanities, cyber security research in December ...
Arizona State University
The cyber security feature, “Defending against data disaster,” discusses the impact of the increase in computer-like devices in daily life and the consequences of data security breaches. Several ASU faculty who are exploring various approaches to ...
GAO report urges better planning, coordination of cyber workforces
FCW.com
By Camille Tuutti An audit from the General Accountability Office has found that the eight agencies with the biggest IT budgets have trouble handling their cybersecurity workforces and determining their composition and responsibilities. ...
Engineer, criminologist join forces to CRUSH black hats
Register
The two academics, both members of the Maryland Cybersecurity Center, are studying cyberattacks from two different angles: one from from the perspective of a user and the other from the perspective of an attacker. The first phase of the study looked at ...
ICANN CEO and President Rod Beckstrom: It's Great Bulgaria Cares So Much about...
Novinite.com
Beckstrom previously served as Director of the US National Cyber Security Center. Prior to that Beckstrom was Chairman and Chief Catalyst of TWIKI.NET, a company which supports TWiki, an open source wiki. He is co-author of the best-selling book The ...
CARAFANO: Staying on offense for cyberdefense
Washington Times
By James Jay Carafano And so it goes with cybersecurity. On this issue, Washington resembles a tribe of cavemen (and women) who, 60 years after the invention of the wheel, still gaze upon the tool and ask each other: “What next? ...
Companies Urged to Share Cyberthreats With US
BusinessWeek
30 (Bloomberg) -- The US government and companies would be encouraged to share information about cybersecurity threats and hacker attacks under legislation unveiled by House Intelligence Committee Chairman Mike Rogers. The measure would shield ...
Obama Invokes Cold-War Security Powers to Unmask Chinese Telecom Spyware
Bloomberg
The survey went to dozens of telecommunications companies, software makers and information-security companies, including some foreign firms, according to James Lewis, a cyber-security expert at the Center for Strategic and International Studies, ...
US bill seeks to improve cyber information-sharing
AFP
WASHINGTON — A bill intended to increase sharing of information aboutcybersecurity threats between government and the private sector was introduced in the US House of Representatives on Wednesday. "There is an economic cyber war going on today ...
GAO Says Agencies Need Better Definition of Cyber Force
ExecutiveGov
While security is dependent on the workforce, the GAO found that none of the agencies examined could accurately account for the number of cybersecurity personnel they had. This issue is being attributed to the recently discussed notion that there is ...
Avoiding the Cyber Crime Holiday
Huffington Post
Just as a manufacturers takes steps to ensure that the products they make are safe for consumers, businesses that engage in online sales must give cyber security the same level of importance. Hackers will check how easy it is to break into a site, ...
OVERNIGHT TECH: House telecom subpanel to vote on spectrum bill Thursday
The Hill (blog)
The House Small Business Committee subcommittee on Healthcare and Technology will hold an afternoon hearing titled Cyber Security: Protecting Your Small Business. Rep. Mac Thornberry (R-Texas), head of the House Cybersecurity working group, ...
AVeS presented with prestigious Symantec award for 2011
ITWeb (blog)
Leading cyber security specialist AVeS has been awarded the prestigious Symantec Small Business Partner (SMB) of the year award for the second time in the past three years, following the company's impressive volumes in a challenging market. ...
Bill would allow feds to share classified cyber information with private sector
FederalNewsRadio.com
By Jack Moore Bipartisan legislation introduced in the House today would allow the federal government to share classified cybersecurity threat information with private companies. The "Cyber Intelligence Sharing and Protection Act of 2011", ...
Cybersecurity at the Air Force Office of Scientific Research » CCC Blog
By Erwin Gianchandani
In a talk titled “Cybersecurity: Technology and Policy,” Fred will describe his research supporting “the construction of concurrent and distributed systems for high-integrity and mission-critical settings with a focus on fault-tolerance and security.” ...
CCC Blog
Global cyber security spending to grow 10 percent a year ...
By admin
Global cyber security spending to grow 10 percent a year.
TechJournal South
Federal agencies struggle to define their cybersecurity workforce ...
By bobgourley
As part of its research, GAO evaluated cybersecurity workforce planning practices at the eight federal agencies with the highest IT budgets. Not one of the agencies could place an accurate number on their cybersecurity personnel, as different ...
Bob Gourley
Rose State College Expands Cyber Security Program – YAHOO ...
By Blackmere
Rose State College of Oklahoma expands its innovative Cyber Security Program with the help of a new grant from the National Science Foundation A recent grant from the National Science Foundation to Rose State College will expand the ...
Blackmere Consulting
2 signs DHS is turning the corner on cybersecurity
By admin
Weatherford, who became DHS' first deputy undersecretary for cyber security on Nov. 21, is the first technologist with hands-on cybersecurity experience in government and the private sector in a DHScybersecurity post, said Paller, director of ...
CrucialPointLLC
HR 3523 Introduced – Cybersecurity Intelligence Sharing
By PJCoyle
A 'certified entity' is a cybersecurity provider, protected entity (someone who has hired acybersecurity provider to provide protect their system), or a self-protected entity (someone who hascybersecurity providers in-house). There are two ...
Chemical Facility Security News
New Cybersecurity Bill Introduced « CableTechTalk
By Paul Rodriguez
New cybersecurity bill would foster sharing of online data between government, private sector [WashingtonPost.com's Checkpoint Washington blog]; Cyber security bill promotes sharing of threat data [CNN's Security Clearance blog] ...
CableTechTalk
Research and Markets: 2011 U.S. Cyber Security - This Study ...
Research and Markets: 2011 U.S. Cyber Security - This Study Covers the Us Market ofCybersecurity within State and Local Government, Examining Applications, Mobile Devices, Outsourcing, and Procurement of Cybersecurity Trends ...
Virtual-Strategy Magazine - Your...
NEWS RELEASE: Pace University launches cyber security institute ...
By alexfischler
NEW YORK, NY — November 30, 2011 – As cyber crime and cyber terrorism multiply, Pace University today launched an institute to help address the nation's acute shortage of trained cyber security professionals. Through partnerships with ...
Press Room
ReportsnReports.com : 2011 U.S. Cyber Security Market
... devices, outsourcing, and procurement of cybersecurity trends. In addition, this study provides a broader understanding of how state and local governments are taking proactive actions to protect their organizations from cyber security threats. ...
BriefingWire.com
Cyber security bill promotes sharing of threat data | FedCyber.com
By AlexOlesker
The House Intelligence Committee introduced legislation Wednesday designed to knock down the barriers that interfere with the federal government and the private sector sharing critical information about cyber security threats. ... 2 signs DHS is turning the corner on cybersecurity · Cyber securitybill promotes sharing of threat data · Federal agencies struggle to define their cybersecurityworkforce, finds GAO · 1000+ UN emails, usernames and passwords leaked · Hackers accessed ...
FedCyber.com
Morning Security Brief: Britain's Cyber Security Strategy; Utility Hack ...
Britain's £650 million Cyber Security Strategy aims to both improve law ... issue, noting, "A couple of lessons stand out from this dramatic week in cybersecurity. ...
www.securitymanagement.com/.../morning-security-brief-brita...
2011 U.S. Cyber Security - PR Newswire
2011 U.S. Cyber Security. ... This study covers the US market of cybersecurity within state and local government, examining applications, mobile devices, ...
www.prnewswire.com/.../2011-us-cyber-security-134817118...
Current R&D Initiatives in Cybersecurity (12/1/11) | EDUCAUSE
Participants: Douglas Maughan, cybersecurity division director in the Homeland Security Advanced Research Projects Agency at the Homeland Security ...
www.educause.edu/blog/kwetzel/.../241987
Booz Allen Reports Top Ten Cyber Security Trends for Financial ...
Booz Allen Reports Top Ten 2012 Cyber Security Trends for Financial Services. ... security as among the Top 10 Financial Services Cyber Security Trends that will .... Booz Allen Industry Leadership · Cybersecurity · What It Takes to Change ...
www.boozallen.com/media-center/press.../cyber-top-ten-2012
European Smart Grid Cyber Security - SMi Group - Event Details ...
European Smart Grid Cyber Security Forum 2012, the leading conference addressing cyber security, ... Gib Sorebo, SAIC, Chief Cybersecurity Technologist ...
www.smi-online.co.uk/2012cybergrids9.asp
White House, Congress Renew Cybersecurity Push
... to breathe new life into the effort to enact national cybersecurity legislation. ... to enact cyber security legislation as soon as possible," said Howard Schmidt, ...
www.crmbuyer.com/rsstory/73851.html

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com