Best (and worst) of 2011: Cyber risk

Best (and worst) of 2011: Cyber risk
Business Insurance
It will cause public companies, if not private companies, to take a much harder look at their cyber security, and its practices and procedures, and it will force insurance brokers to get their arms around what this insurance product really is. ...
Cyber begging is a growing online trend
Tbo.com
Cyber Security Analyst Mary J. McLaughlin, of the Florida Department of Law Enforcement, said cyber begging is legal, but she doubts it'll be successful. McLaughlin said she expected to see a wave of cyber after the success of Karyn Bosnak in 2002. ...
Officials say Huntsville will prosper despite defense cuts, but urge ...
al.com (blog)
Huntsville has also been diversifying its economic base, working to get more energy and cybersecurity companies that have commercial and foreign sales as well as federal customers. And, of course, the biotech industry continues to grow here: the ...
A Whitehall scandal that's bigger than lobbying?
Telegraph.co.uk
Among other cases approved by Acoba in the past 18 months is that of John Suffolk, who has moved from the highly sensitive post of chief information officer at the Cabinet Office to global cybersecurity officer for Huawei, a Chinese company accused by ...
Online @ India
Hindustan Times
And when required, the intermediary shall provide information or assistance to government agencies authorised for investigative, protective, cyber security activity. However, critics of filtering of content say that most social networks already have ...
Chris Dodd Finds the Silver Lining in Chinese Internet Censorship
The Atlantic Wire
And among the institutions criticizing the proposed law is Sandia National Laboratories, which is funded by the federal Department of Energy and believes the law would "negatively impact US and global cybersecurity and Internet functionality. ...
NEC Showcases Safer Cities concept at IFSEC 2011 Displays its latest array of ...
India PRwire (press release)
... deliver the most advanced and comprehensive suite of integrated security solutions including multi-biometric identification, access gates, video surveillance, cyber security and behavior pattern analysis for governments and authorities worldwide. ...
SECRETARY NAPOLITANO'S MEETING WITH TRANSPORTATION SECRETARY AND CANADIAN...
The Cypress Times
... a new long-term security partnership by addressing threats early; promoting trade facilitation, economic growth and jobs; strengthening cross-border law enforcement; and protecting shared critical infrastructure, including enhancing cybersecurity. ...
Congress Pushes Bills To Promote Cybersecurity : NPR
Congress isn't doing much — with the major exception of cybersecurity. Citing rare bipartisan agreement and a common sense of purpose, members of both ...
www.npr.org/.../congress-pushes-bills-to-promote-cybersecurit...

UTSA gets slice of $3 million cybersecurity grant
San Antonio Express
The grant comes as a shot in the arm for UTSA's Institute for Cyber Security, which has attracted some of the field's top professors and is viewed as a key component of the city's efforts to becoming a cybersecurity hub.
Developing countries most vulnerable to cyberattacks - UN
Associated Press of Pakistan
UNITED NATIONS, Dec 10 (APP) - Developing countries are at higher risk of being the target of cyberattacks, a UN-led forum on cybersecurity heard Friday, where experts discussed ways to mitigate this phenomenon at the national and international levels. ...
Students at Mt. SAC, Cal Poly learning to be cyberwarriors in war against ...
Whittier Daily News
President Barack Obama even appointed a Microsoft security specialist, Howard Schmidt, to be hiscyber-security czar and gave the Pentagon the power to attack other countries' computers, if necessary. Locally, students and faculty at Cal Poly Pomona ...
Pakistan cyber army may have hacked Cong site
Hindustan Times
Cyber security experts now feel it could be a cross-border operation. The hacking was reported on Sonia Gandhi's 65th birthday. After its detection, administrators shut the website temporarily and restored it after removing the obscene content. ...
KPN suspends subsidiary sites following breach
Broadband Expert (blog)
In efforts to discourage would-be hackers, the 2011 Cyber Security Strategy was created in order to protect Britain and the web business from the negative effects of cyber crimes. One provision in the strategy was to cyber-tag online criminals as ...

Deltek: Cybersecurity spending should grow
Washington Post
Cybersecurity spending. Agencies have little choice but to beef up budgets. The number of federalcybersecurity incidents reported to the Department of Homeland Security's US Computer Emergency Readiness Team has jumped 659 percent since 2006. ...
White House Cyber-Security Priorities Revealed
CIO Insight
The Obama Administration has outlined its road map of priorities for government agencies that sponsor research and development on cyber-security. The plan is the result of seven years of examination and consideration by cyber-security experts in both ...
The Cybersecurity “Wake Up Call” and the Snooze Button
SYS-CON Media (press release) (blog)
While Alex has dealt rather masterfully with the consequences of the trumped-up Russian SCADA hacking incident, I'd like to point to a different aspect of it: the cybersecurity “wake up call.” The Springfield incident was immediately called a “wake up ...
UK Cyber Security Strategy 'lacks' plan of action
Acumin
There are a number of good points about the new UK Cyber Security Strategy, but it does not state exactly how such problems are going to be tackled. This is according to the chief technology officer at Imperva, Amichai Shulman, who explained that some ...
Congress Pushes Bills To Promote Cybersecurity
North Country Public Radio
by Martin Kaste Dec 9, 2011 (All Things Considered) — Congress isn't doing much -- with the major exception of cybersecurity. Citing rare bipartisan agreement and a common sense of purpose, members of both parties are advancing bills designed to ...
Nigeria investigates ZTE cybersecurity contract
IDG News Service
Nigeria's lawmakers have given the go-ahead to a joint committee of police, public procurement, debt management and IT officials to investigate China's ZTE over a $470 million contract for the Nation Communication Security System. ...
2008 Computer Breach Brings New Cybersecurity
NewsMax.com
By Henry J. Reske A 2008 breach of a US military classified computer network sent investigators scrambling and led to major changes in cybersecurity. Pentagon officials consider the October 2008 incident the most serious violation of its computer ...
China 'working hard' to develop IT sector, ensure cyber security
China Daily
By Tan Yingzi (China Daily) WASHINGTON - As one of the major Internet powers in the world, China is willing to work with the United States to advance the development of information technology and fight cyber crime, a senior Chinese information official ...
Pace launches cyber security institute
Westfair Online
Pace University's Seidenberg School of Computer Science and Information Systems said it is opening an institute to address the need for more advanced training in the field of cyber security. Starting in the fall 2013, the Seidenberg Cyber Security ...
Developing countries most vulnerable to cyberattacks – UN
UN News Centre
Developing countries are at higher risk of being the target of cyberattacks, a United Nations-led forum on cybersecurity heard today, where experts discussed ways to mitigate this phenomenon at the national and international levels. ...
The Sky Isn't Falling, But the Internet Might
Insurance Networking News
The broader GAO report, “Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination,” examined threats to federal information technology (IT) infrastructure and systems, which the report says continues to grow in number and ...
US electric grid at risk?
UPI.com
Cybersecurity vulnerabilities can arise from weaknesses in personnel, processes, technology and the actual physical environment, says, the "Future of the Electric Grid" report by the Massachusetts Institute of Technology. "Millions of new communicating ...
US, Russia work to expand cyberspace cooperation
Reuters UK
Howard Schmidt, the White House cybersecurity coordinator, said in a July 12 blog that the United States and Russia planned to have three types of cybersecurity-related cooperative mechanisms in place by the end of this month, including special "24/7" ...
All of TIME.com
TIME (blog)
That's how much the world is going to spend on cyber-security in 2011, according to a new analysis by PricewaterhouseCoopers. And, unlike most defense spending, it's going up. If you're looking to get in on the action by buying a cyber-security firm, ...
Michael Powell, National Cable & Telecommunications Association, President & CEO
C-SPAN
He discusses the internet, cybersecurity, advertising and spectrum, all issues impacting the future of cable and telecommunications. The Communicators airs Saturday at 6:30 pm ET on C‑SPAN and Monday at 8 am and 8 pm ET on C‑SPAN 2.
US Steel spent $800000 in 3Q gov't lobbying
CBS News
The proposals included standards for chemical facilities and cybersecurity. Other topics included appropriations for infrastructure and other transportation projects, enforcement of US trade laws, offshore leasing, tax issues and workplace safety. ...
Perhaps SOPA Should Be Called The Stop Online PRIVACY Act
Techdirt
Critics of the Stop Online Piracy Act and its Chinese Firewall approach to combatting Internet piracy have hammered the ill-advised legislation for the predictable damage it would inflict on cybersecurity, innovation, and above all, free speech. ...
Sourcefire Announces Next Generation Firewall
Dark Reading
About Sourcefire Sourcefire, Inc. (Nasdaq:FIRE), a world leader in intelligent cybersecuritysolutions, is transforming the way global mid- to large-size organizations and government agencies manage and minimize network security risks. ...
Uncertain Rules of Engagement in Cyberspace
Lawfare (blog)
by Robert Chesney Ellen Nakashima of the Washington Post, whose reporting on cybersecurityissues (including counterespionage and offensive computer network operations) is indispensible, had an extraordinary piece yesterday concerning an episode that ...
Cyber threat clearinghouse key to national security
FCW.com
Private industry owns 85 percent of the country's critical infrastructure and deploys far morecybersecurity experts than the government ever will. The Homeland Security and Justice departments counter cyber threats, but much more should be done. ...
Over half UK population are victims of cybercrime
Techwatch
State of the Nation was published last month and acknowledges that the government have now made cybersecurity a priority, labelling it a top-tier threat and recently allocating £650 million to various departments to help fight the cybercrime menace. ...
Hacking for the greater good
Livemint
The government has a number of organizations that work in the field of cyber security. This includes both organizations within the Armed Forces and the civilian fields, but there is a strong need to build a trusted group of experts to call upon. ...
Agency to Host Workshops on Cyber-Physical Systems
GovInfoSecurity.com
NIST also announced its Information Technology Laboratory's Computer Security Division will host a two day conference to explore the cybersecurity needed for cyber-physical systems. NIST Special Publication 800-155, BIOS Integrity Measurement ...
Experts: Stolen Patient Data Is Most Lucrative Form of Identity Theft
iHealthBeat
Medical identity theft has become one of the most lucrative forms of identity theft, according to a panel of cybersecurity experts at the recent Digital Health Conference in New York, MedPage Today reports. Scammers can use electronic health records, ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com