Cybersecurity insurance: What you need to know

Cybersecurity insurance: What small businesses need to know
Washington Post (blog)
In fact, these are but a few of many steps business owners can take to prevent cybersecuritybreaches and subsequent data theft. But they aren't foolproof, none of them, not even in combination. The total number of cyber attacks hit its highest ever ...

5 reasons cybersecurity matters to small businesses
ZDNet (blog)
Depending on the statistics you believe, the average cost of a breach or cybersecurity incident is about $190000. Do you have that sort of money to lose? Even more serious: about half of small businesses still don't back up their data, so what is lost ...

Cybersecurity career experts: Mobile app security skills hot in 2012
SearchSecurity.com
Recruiters recommend the path to cybersecurity career success is found by having a well-rounded skill set and the ability to communicate effectively in a business environment. “If you want to stand out, go do the things most people don't do; ...

A winding cybersecurity road
ModernHealthcare.com (blog)
But last week, I dropped down a rabbit hole and spent about a half hour exploring a strange new (to me, at least) netherworld of healthcare cybersecurity. I've written a little about healthcare IT and national security and the possibility that people's ...

Cyber security at the forefront of business thinking in 2012
Chartered Management Institute (blog)
According to Mark Dampster, associate of the Centre for Cyber Security, the amount of data being produced currently is "heart stopping". He explained that the nature of the data, such as confidential information, its location and the context it can be ...

Viewpoint: We must resist over-hyping security threats
BBC News
By James Lyne Senior technologist, Sophos 2011 has been the year of cybersecurityawareness, with the headlines frequently featuring reports of serious cyber-attacks and references to "cyber-warfare". As a result, "cybersecurity" has gained much needed ...

BBC News

The Emperor's New Public-Private Partnership
Nextgov
By Jessica Herrera-Flanigan 12/29/11 12:14 am ET These days, there is much chatter in thecybersecurity space about the need for robust "public-private partnerships." Just last month, the Department of Homeland Security in its Blueprint for a Secure ...

'M'sia needs to produce own cyber security software'
The Borneo Post
KUALA LUMPUR: Malaysia needs to produce its own cyber information security software as depending on foreign software may risk information leaks and intelligence breaches, said a software expert here yesterday. Universiti Putra Malaysia (UPM) Computer ...

2011: Year Of Success For Nation's ICT Sector
Bernama
Despite all the achievements, Malaysia also faces cyber security issues, and the nation is expected to lose RM2.73 billion in the next five years if it is not properly managed. A total of 7404 cyber security cases were handled by CyberSecurity ...

Vishing and smishing you a Happy New Year
Examiner.com
December 28, 2011 Cyber security experts warn that the latest research evidences a considerable increase in two malicious schemes known as vishing and smishing. The FBI and USDepatment of Homeland Security CERT provide up to date information on cyber ...

Government to Strengthen Security of Information Systems
ERR News
A new cyber security plan approved today by the Cabinet would better defend national information systems from potential cyber attacks and system failures. Next year, the Ministry of Economic Affairs will conduct a nationwide cyber-security exercise. ...

Complexity Major Info Risk Challenge
GovInfoSecurity.com
"We see this as being fairly debilitating in regards to implementing goodcybersecurity programs," Ron Ross, senior computer scientist at the National Institute of Standards and Technology, says in a roundtable discussion on new trends in information ...

GovInfoSecurity.com

Why Compliance Can't Create Security
GovInfoSecurity.com
Credit Eligible Regulators push tougher cybersecurity measures. But the challenge for smaller organizations isn't compliance - it's budgets. Wendy Nather of 451 Research defines the 'Security Poverty Line' and what to do about it. ...

GovInfoSecurity.com

Financial terrorism
The Economist
In 2010 Symantec, a cybersecurity firm, estimated that three-quarters of all “phishing” attacks, in which people are deceived into surrendering private details such as account numbers, are aimed at the finance sector. Bob Greifeld, the boss of NASDAQ, ...

Iowa GOP Ups Protection Against Hacker Attack
WNYC (blog)
Law enforcement and cyber security geeks are also on high alert following a threat from a group of hackers delivered via video. "The video claims to be from Anonymous, a loosely organized group of hackers that has claimed credit for attacks on targets ...

Anonymous strikes private security firm “Stratfor”
Daily Caller
By Alexi Mostrous - The Times Published: 5:50 PM 12/28/2011 A cyber securityanalyst looks at code in the Malware Laboratory during the first tour of the government's secretive cyber defense lab intended to protect the nation's power, ...

Daily Caller

COMMENT: The changing face of cyber terrorism —Musa Khan Jalalzai
Pakistan Daily Times
To combat the forces of financial jihad, Britain's Cyber Security Strategy was published in November 2011, which underlined the technicality of the threat faced by the country's institutions from economic jihadists and state-sponsored cyber forces. ...

McAfee Labs predicts Windows 8 attack threats for 2012
Neowin
The amount of threats to PCs and mobile devices continues to increase, according to a new paper released today by Intel-owned cyber security company McAfee. The paper, which can be read in full in PDF format, goes over those predictions which include ...

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage ...
Lawfare (blog)
But his book brings the subject together more cogently and cohesively than do prior alarmed warnings about our cybersecurity future. It thus deserves pride of place in a literature we can all hope will read some day as a mere expression of anxiety at ...

DHS Division, Idaho National Lab Win Cybersecurity Award
Renew Grid
by Renew Grid on Wednesday 28 December 2011 The US Department of Homeland Security's (DHS) national cybersecurity division and Idaho National Laboratory have won the 2011 US NationalCybersecurity Innovation Award for building cybersecurity skills ...

Online scammers prey on holiday mood
AsiaOne
Cybersecurity experts that my paper spoke to said that the holiday season historically sees a significant rise in the number of online threats by cyber scammers taking advantage of victims who might be away on holiday. In a study published in September...

AsiaOne

News Bites: GoDaddy accused of delaying SOPA transfers
The Hill (blog)
... Web domain service GoDaddy of delaying transfer by customers angered by the firm's now-withdrawn support for the Stop Online Piracy Act. The hacking of security think tank Stratfor highlights the complexity of the current cybersecurity debate. ...

US-CERT Warns Of Security Flaw In Wireless Routers
CRN
US-CERT is part of the National Cyber Security Division of the US Department of Homeland Security. The organization is a partnership between Homeland Security and the private and public sectors.

Online security breach raises key question
Yuma Sun
Jerry Irvine of the National Cyber Security Task Force told the New York Times that “getting into a system is really not that difficult.” Well, if there isn'ta way to make it a lot more difficult — if not impossible — then maybe it is time to ...

New DoD Plan Could Be Big Boost for Clouds
Internet Evolution
Fortunately, the NDAA includes a significant set of provisions to improve cybersecurity. For now, we can only speculate on what the DoD CIO will propose in the performance plan and the effect it will have more broadly on cloud computing innovation and ...

Aggressive Phishing Attack Targets Military Personnel
InformationWeek
... although the number of actual incidents have been slacking off while other types of attacks have been on the rise, according to the United States Computer Emergency Readiness Team (US-CERT), which keeps track of US cybersecurity incidents. ...

Belatedly, state starts efforts to set up IIIT
Times of India
It was supposed to offer research programmes in various emerging fields such as cyber security and image processing, networks and mobile computing, banking and insurance, energy and transportation, analytics, remote sensing, agriculture, energy, ...

Anonymous, RSA Lead the Top IT Security News of 2011
eWeek
Richard Clarke, the former cyber-security czar for President George W. Bush, has identified China's government and its industries as a major source of cyber-hacking and espionage targeting intellectual property and competitive information. ...

eWeek

Has Politics Trumped Truth?
Forbes
Opponents (including Consumer Electronics Association) argued how the bill would hurt America'scyber security, the technical integrity of the Internet, start-up Internet companies and websites with user generated material. ...

The Hacks That Mattered in the Year of the Hack
The Atlantic Wire
In February, Anonymous decided to declare war on Aaron Barr, chief executive of the once-relatively little known cyber security firm HBGary Federal. Barr had made the silly mistake of publicly announcing that he'd infiltrated the collective and knew ...

The Atlantic Wire

Hackers Leak Data of 46 Million Users in China
NTDTV
But analysts like the former president for Yahoo China, Xie Wen, say that won't solve the problem because China's cyber security is low. "A lot of Chinese internet companies are poorly constructed, with low quality technical input. ...

Staying safe online: the need for cybersecurity | TruckerSteve.ORG
By admin
The day that President Obama launches review of cybersecurity policy, to hear from experts and officials in the field. This video features Secretary.
TruckerSteve.ORG

Are we serious about cybersecurity? - Blogs - WindowSecurity.com
By Debra Shinder
Sometimes it seems as though cybersecurity is a little bit like the weather: everybody talks about it but nobody does anything about it. We might not be able to do much about the weather (although with some of today's technology, that's ...
Deb Shinder's Blog

Cybersecurity career experts: Mobile app security skills hot in 2012 ...
By lowes1
Cybersecurity career experts: Mobile app security skills hot in 2012 SearchSecurity.com “If you want to stand out, go do the things most people don't do; learn how to speak; learn how to write; things a computer science education didn't advent ...
Why CTE: Career Technical Education

International Cyber Arms Bazaar Demonstrates Depth US Must Go ...
By Gino Troiani
International Cyber Arms Bazaar Demonstrates Depth US Must Go for Cybersecurity. dhs.gov. Earlier this month, a diverse crowd of government agents, private developers and hackers from around the world gathered at a Hilton in Malaysia's ...
The New New Internet

DHS | DHS' Progress in 2011: Strengthening Cybersecurity
DHS' Progress in 2011: Strengthening Cybersecurity. Highlighting Our Progress in 2011: Department of Homeland Security. Motherboard close-up. In FY 2011 ...
www.dhs.gov/.../2011-dhs-accomplishments-strengthening-cy...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com