New cybersecurity bill would foster sharing of data

New cybersecurity bill would foster sharing of online data between government ...
Washington Post (blog)
“They're just going to blow a hole through all the privacy laws on the books for cybersecuritypurposes,” said Michelle Richardson, legislative counsel for the American Civil Liberties Union. The Cyber Intelligence Sharing and Protection Act of 2011 ...
BCS: Government cyber security strategy lacks framework
PC Advisor
By Antony Savvas | Computerworld UK | 30 November 11 The government needs to produce a "framework" for its recently published UK Cyber Security Strategy if it is to succeed, according to the BCS, The Chartered Institute for IT. ...
New report reveals DHS cyber-security nothing 'specialized'
Examiner.com
However, multiple series are applied for cyber-security jobs, and none of the series identifies cyber-security as the only job responsibility. Consider an excerpt taken directly from the GAO report: "In many cases, employees with cybersecurity ...
Top Ten Cyber Security Trends for financial services in 2012
CXOToday.com
By CXOtoday Staff, Nov 30, 2011 05:20 PM Booz Allen Hamilton has cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the Top 10 Financial Services Cyber Security Trends that will make ...
Britain must avoid cyber-security complacency
Public Service
Head of cyber at the MoD Major General Jonathon Shaw told a cyber-securityconference in London that the "post-attack strategy" developed by Estonia had helped to improve user education. He said Estonia was "an interesting example of a country in...
The effect of the Cyber Security Strategy on the ISP, and ultimately the end-user
SC Magazine UK
Of all of the proposals in last week's Cyber Security Strategy, most seemed to be government or public sector led with little direct immediate impact on UK plc. Apart from one section, where the government said it would 'work with internet service ...
The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world
Docuticker
... new and transformative programme to improve our game domestically, as well as continuing to work with other countries on an international response. Chapter 3 sets out where we want to end up – with the Government's vision for UK cyber security in 2015.
2 signs DHS is turning the corner on cybersecurity
GCN.com
Weatherford, who became DHS' first deputy undersecretary for cyber security on Nov. 21, is the first technologist with hands-on cybersecurity experience in government and the private sector in a DHScybersecurity post, said Paller, director of research ...
UK Conference to Encourage Government and Industry Cooperation in Wake of ...
Sacramento Bee
By Defence IQ As the government's new cyber strategy calls for the public and private sector to work more closely on information security, the Cyber Defence & Network Security conference in January brings together military cyber commands, government, ...
As cyberattacks grow, take security seriously
Network World
No company wants to be the subject of the next headline about a cybersecurity attack or critical data loss. Losing business data or customer information takes a toll on your business' reputation and its pocketbook. While it is impossible to entirely ...
Building public-private cyber defense
Politico
US businesses, which own and operate many of the most valuable information systems, are America's first line of defense against cybersecurity threats. Chief executive officers take this responsibility seriously. We have integrated cybersecurityinto ...
Enabling security for co-ops
Intelligent Utility
That's one reason Frank Sams, manager of network systems for Flint Energies, is glad to be one of nearly two dozen co-ops participating in the Cooperative Research Network's (CRN's) smart grid demonstration project that has produced a cyber security ...
Crying “Cyber Attack” in Illinois
Smart Data Collective
Jim Langevin, the founder of the Congressional Cybersecurity Caucus, lamented our state of preparedness and called the attack, allegedly the first against the United States with a kinetic effect, yet another “wakeup call.” The weakness of American ...
Cyber threats appearing where even savvy users don't expect
Computer Business Review
Doctor Stephan Lechner, director general of the Institute for the Protection and Security of the Citizen, Joint Research Centre, European Commission, in a lecture to the Cyber Security Summit says that he believes Cybersecurity has finally 'gone ...
New Jersey Trains New Class of Lawyers to Prosecute Cybercrime
HSToday
“I was trying to work with our New Jersey law schools to produce programming on cyber crimes andcyber security, which was an area in my judgment … really was not offered out there.” Meanwhile, an idea for a cybersecurity law project was stewing in ...
CyberPatriot IV Prepares for Second Round of National High School Cyber ...
Sacramento Bee
CyberPatriot is the nation's largest high school cyber security challenge. This unique competition was designed to give students a hands-on learning experience in cybersecurity and inspire students to consider science, technology, engineering and ...
Sourcefire's Immunet Anti-Malware Solution Surpasses 2 Million Endpoints
Channel EMEA
by Michelle Silva, Wednesday 30 November 2011 Sourcefire, Inc. (Nasdaq: FIRE), a leader in intelligent cybersecurity solutions, has announced that Immunet®, the company's advanced anti-malware solution, has surpassed 2 million installed endpoints. ...
966 cyber crime cases reported in 2010: Sibal
Zee News
"With the increase in the increasing proliferation of IT and related services, there is a rise in the number of cyber crimes and cyber security incidents," Sibal said in a written reply to the Lok Sabha. According to data maintained by National Crime ...
Mozilla amps up fight against anti-piracy and Internet protection bills
Washington Post
But the company also says that the measures could threaten cybersecurity. “Just like SOPA, this bill will create new cybersecurity risks and jeopardize the basic structure of the internet as we know it,” Mozilla wrote in a statement on its Web site. ...
A small step for the UK Government
ComputerWeekly.com (blog)
Of course any investment in cyber security has to be welcomed, so we have to congratulate the chaps at the Cabinet Office for negotiating their way around the cutbacks. But let's keep this in perspective: £650 million is not an insubstantial amount, ...
Technology News
Governing (blog)
According to a survey released in October, 2011 by Symantec and the National Cyber SecurityAlliance (NCSA), two-thirds of US small businesses rely on broadband Internet for their day-to-day operations. The Small Biz Cyber Planner will be of particular ...
The Insider Threat Worst-Case Scenario
SYS-CON Media (press release) (blog)
This cybersecurity and privacy nightmare might seem implausible, but that's exactly what happened in Israel, where 9 million records, those of every living citizen and some deceased, were leaked online and eventually sold on the black market. ...
SEC issues guidance on cybersecurity risks and incidents
Lexology (registration)
While not a formal interpretation, the guidance provides valuable insight into the sort of disclosure practices registrants should consider when evaluating their own cybersecurity (including risks and incidents). In particular, the Guidance clarifies ...
DMI to Provide Enterprise-Wide IT Solutions for the Department of Veterans Affairs
Sacramento Bee
DMI was selected for this contract because of its deep expertise in IT strategy, cybersecurity, and program management. DMI will provide the VA with solutions that encompass a wide range of IT requirements, including: "We are very pleased to work with ...
Company looks to help coordinate the fight against cloud-crime
CenterBeam
In an effort to help fight cybercrime in the cloud, Trend Micro, a computer security company, is looking to link up with the International Cybersecurity Protection Alliance to establish the "Global Cyber Nation" in Washington, DC The company said this ...
Hackers accessed city infrastructure via SCADA – FBI
Information Age
Speaking at the Flemings Cyber Security conference in London, Michael Welch said the hackers could theoretically have dumped sewage into a lake or shut off the power to a shopping mall. "We just had a circumstance where we had three cities, ...
Cybersecurity and the public company: keeping your disclosures safe and sound ...
Lexology (registration)
As companies begin the preparation of their year-end periodic reports, they are cautioned to closely review the Securities and Exchange Commission's (SEC's) recent guidance on disclosure obligations relating to cybersecurity risks and cyber incidents.3 ...
Work on safe tweeting
The Canberra Times
New research from Telstra's cyber security team shows that bosses use social media to keep tabs on their workers and their behaviour outside of the office. After interviewing more than 1200 Australian employers, researchers found that one in five ...
Kratos Partners With AlienVault to Enhance Cyber Security and Situational ...
defpro
29 that its RT Logic subsidiary has entered into an exclusive partnership with AlienVault to design, develop and deliver new cyber security solutions for the Satellite Communications (SATCOM) industry. The goal is to help defense, government and ...
Technology 'holds key to communications security' for firms
Taylor Vinters
Mark Dampster, associate of the Centre for Cyber Security, said it is not just the internet where companies have to be vigilant, but as the recent phone hacking scandal has shown, communications of all sorts must be tamper proof. ...
The 2012 World Conference On International Telecommunications: Another Brewing ...
Who's Who Legal
Some countries are seeking to include cybersecurity and cybercrime provisions into this treaty so that the ITU can impose new regulations and establish itself as the organisational home for international cybersecurity policymaking. ...
Cybercrime Victims Often Provide Access Unwittingly: Report
Channel Insider
Both are members of the Maryland Cybersecurity Center. Their work is thought to be one of the first looks at the relationship between computer-network activity patterns and computer-focused crime trends. "We believe that criminological insights in the ...
Virtualisation creates data management challenges
Ontrack Data Recovery
Mark Dampster, associate of the Centre for Cyber Security, also warned that businesses need to be careful about increased security requirements when moving their data management processes to the cloud. Is your data asset getting out of sight? ...
Stephen Cheetham | Bloomberg – Cyber Security | illustration news
By stephencheetham
A piece I did for Bloomberg to accompany an article on cyber security. Read more about… Bloomberg – Cyber Security · Tweet. Posted on November 30, 2011 by Stephen Cheetham | Portfolio | Website.
Cybersecurity mainly male domain, geek image deters girls ...
By Blackmere
Cybersecurity mainly male domain, geek image deters girls – Calgary Herald. Published November 30, 2011. WASHINGTON - There were no lines for the ladies room. That was unusual for an event attended by thousands but typical in the ...
Blackmere Consulting
Cyber security bill promotes sharing of threat data – CNN Security ...
By pambenson1
The House Intelligence Committee introduced legislation Wednesday designed to knock down the barriers that interfere with the federal government and the private sector sharing critical information about cyber security threats. The bill would enable the intelligence community to share classified information with the private sector while at the same time addressing the ... Post by: CNN Senior National Security Producer Pam Benson Filed under: Congress • Cybersecurity • Intelligence ...
CNN Security Clearance
White House, Congress Renew Cybersecurity Push – Bob Gourley
By bobgourley
“Some good news: just last week, we had a very encouraging meeting with a bipartisan group of Senators that ended with agreement to work together to enact cyber security legislation as soon as possible,” said Howard Schmidt, cybersecurity ...
Bob Gourley
Crisis Mapping and Cybersecurity – Part I: Key points | Diary of a ...
By Anahi Ayala Iacucci
In one of the sessions at ICCM, which was entirely focused on this subject, some very interesting issues came out, which will give me some more ground to explain why I think that almost 90% of the discussions on cyber-security tend to take a ...
Diary of a Crisis Mapper
Crying “Cyber Attack” in Illinois
By admin
Jim Langevin, the founder of the Congressional Cybersecurity Caucus, lamented our state of preparedness and called the attack, allegedly the first against the United States with a kinetic effect, yet another “wakeup call.” The weakness of ...
CrucialPointLLC
Cyber Risk Management and Misinformation | Big Fat Finance Blog
By Eric Krell
I read Washington Post article -- a piece of reportage describing yet another disturbing cyber security  breach -- that ... ... This SEC guidance is critical because it allows market participants to weigh cybersecurity as an investment factor. ...
Big Fat Finance Blog
GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better ...
determining the size of their cybersecurity workforce because of variations in how ..... vacant positions at the department's National Cyber Security Division ...
www.gao.gov/new.items/d128.pdf
Cybersecurity Requires Patches, Not a Vast Bill: Susan Crawford ...
When cybersecurity problems arise, the best response is to adopt a patch as soon as it's available. You don't want to wait for an entirely new operating system to ...
www.businessweek.com/.../cybersecurity-requires-patches-not-...
Thales UK News | Thales welcomes UK Cyber Security Strategy as ...
Thales welcomes UK Cyber Security Strategy as a foundation for growth The UK's national prosperity and national security depend on the digital domain – we ...
www.thalesgroup.com/.../251111_Thales_welcomes_UK_Cyb...
Approach to NERC Reliability Standards compliance and cyber ...
KEMA outlines a structured approach to develop a successful cyber security program and meet NERC CIP Standards compliance.
www.kemautilityfuture.com/a-structured-approach-to-nerc-reli...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com