Power Grid Cybersecurity: Who's In Charge?

Power Grid Cybersecurity: Who's In Charge?
TechNewsWorld
Cybersecurity experts have been murmuring for some time that the United States' power supply is open to cyberattacks. "If someone were to think about attacking another nation, the first thing they'd do is take out the power grid, since it's the hub ...

White House Unveils Cybersecurity R&D Plan
GovInfoSecurity.com
The White House has issued a strategic plan that defines a set of interrelated priorities for federal agencies that conduct or sponsor research and development in cybersecurity. The Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity ...

GovInfoSecurity.com

Finra aims for brokerage cyber security
FierceFinanceIT
It was only a matter of time before the financial industry regulators started to pay more attention to cyber security concerns. The likelihood of a massive breach grows with every day, and perhaps some standards are in order. ...

Cisco cybersecurity exec to speak at Wichita State luncheon
Kansas.com
By Jerry Siebenmark Donald Proctor, senior vice president and leader of Cisco'sCybersecurity Task Force, will be the keynote speakers for Wichita State's James P. Schwartz Memorial Lecture Series. It begins at 11:45 am on Jan. ...

Preparing In-House Counsel for a New Year of Cybersecurity Threats
Corporate Counsel
There's been much discussion of how government and the private sector need to put their heads together on cybersecurity measures, just as laws governing data privacy continue to proliferate around the globe. In-house lawyers need to stay ahead of these ...

CSC forms Insurance Cybersecurity Advisory Council
Insurance Business Review
American information technology company Computer Sciences Corporation (CSC) has formed the Insurance Cybersecurity Advisory Council for life insurance and annuity providers and property/casualty insurers. The council will facilitate the development of ...

Cybersecurity Malaysia Ready To Face Attacks From Foreign Hackers
Bernama
PUTRAJAYA, Dec 16 (Bernama) - CyberSecurity Malaysia is prepared to face attacks from foreign hackers like what happened in June, said Chief Executive Officer Lt Col (Rtd) Datuk Husin Jazri. He said Malaysia has learnt a lesson from hacker attacks on ...

The Cyber Security Casino: Betting with House Money
Business Insider
Yet often that's what a lot of cyber security advice sounds like. It's true that social networks are a hotbed for malware, hackers and spam. But staying off Facebook — for some people in certain industries — could have real-world repercussions. ...


Will US Businesses Finally Get Some Cybersecurity?
Wall Street Journal
But judging from how other cybersecurity legislation—often broader, more complex, and thus controversial— has bogged down in Congress, this effort may be the nation's best bet. "It's very targeted on solving one particular problem," says Chris ...
Wall Street Journal

CSC Forms Insurance Cybersecurity Advisory Council
Information Management
Cloud computing and other technologies promise productivity, but many can leave insurers vulnerable to cybersecurity threats. On the heels of reports coming out of Washington on the government's scramble to protect the country's power grid from ...

Md. student in top 5 of national high school cybersecurity competition
Examiner.com
The online competition, conducted in collaboration with the SANS Institute and the Common Knowledge Scholarship Foundation (CKSF), featured a series of quizzes in the most important foundational fields of cyber security: networking, operating systems, ...

Former DHS Assistant Secretary Stewart Baker On SOPA 2.0: Still A Disaster For ...
Techdirt
One of the most credible critics of SOPA -- and one whose concerns certainly got the interest of Congress during the November Judiciary Committee hearings -- is Stewart Baker, the former Homeland Security Assistant Secretary and former NSA General ...

Cybersecurity a growing issue in the U.S.
Live Insurance News
According to US cybersecurity analysts, 12 small groups of hackers from China are responsible for more than $1 billion worth of data from companies throughout the nation. These groups have been monitored by McAfee, a prestigious Internet security...
Live Insurance News

ISC8 Releases Fiscal 2011 Results
Sacramento Bee
OB), a provider of intelligent Cybersecurity solutions and supporting technologies, today reported audited operating results for its fiscal 2011, the 52 weeks ended October 2, 2011. Total revenues for fiscal 2011 were $14095000, an approximate 20% ...

Feds playing catch-up in cybersecurity?
FederalNewsRadio.com
Assessing cyber threats has gotten more difficult — especially as hackers and other bad actors have devised even more ways to break into networks, including federal. The intelligence community faces particular challenges in the cyber world. ...

Cyber criminals will target small business, the cloud, mobile and social ...
TechJournal South
So says The Cyber Security and Information Assurance Division of Kroll Inc., which released its annual security forecast, highlighting key areas of risk and trends that will impact how organizations and governments combat and respond to cyber threats. ...

DHS Releases Cyber Blueprint
Nextgov
By Brittany Ballenstedt 12/15/11 12:30 pm ET The Homeland Security Department earlier this week released a blueprint for managing and protecting the nation against cybersecurity threats. Not surprisingly, one aspect of the strategy includes investing ...

Oracle spends $1.26M on 3rd-quarter lobbying
BusinessWeek
Oracle's spending on lobbying was one of the largest amounts among technology companies and comes amid its growing need to influence the federal government on a range of topics; including defense and other funding, cybersecurity, copyright protections ...

Breaking campaign: Govt. launches cyber security search
B&T Marketing & Media
By Madeleine Ross on 16 December 2011 The federal government has launched a search for two national ambassadors for cyber security as part of its new 'Stay smart online' campaign. Created by Porter Novelli Melbourne, the initiative aims to promote ...

Are you hiring a security risk?
Moneycontrol.com
In this holistic approach to cyber-security, the HR department needs to see itself, and be seen, as the key internal customer of [computer system] monitoring, he says. The consultancy is working with the UK's Centre for the Protection of National ...
Moneycontrol.com

MVCC wins award for CyberJobs program
The Rome Observer
“This is an indicator of more good things to come for MVCC, we are quickly becoming the premier community college for cybersecurity,” he said. The cyber-security training program is funded by a $2.8 million, three-year Community Based Job Training ...

Brit PhD student excels in Pentagon digi-forensics challenge
Register
Richardson will receive £2000 of security training from 7Safe as a reward for his efforts, which have also earned him a place in the UK Cyber Security Challenge UK's face-to-face play-offs next year. He qualifies, alongside several runners up, ...

AMD spends $120000 on 3rd-quarter lobbying
BusinessWeek
It also lobbied on immigration policy, something tech companies would like to see relaxed so it could more easily hire foreigners with special skills. AMD lobbied on cybersecurity, free trade, anti-counterfeiting protections and other issues.

Huntsville superintendent details technology center closure plans
The Huntsville Times - al.com (blog)
Grissom would have an emergency medical technician program, and courses incybersecurity and biomechanical systems engineering. The school already has some courses in cybersecurity and engineering, and the classes moved from the tech center will ...
The Huntsville Times - al.com (blog)

Time Warner Cable spent $2M to lobby in 3Q
BusinessWeek
Time Warner Cable Inc. spent more than $2 million in the third quarter to lobby the federal government on such issues as cybersecurity, online pornography, copyright protections and consumer privacy, according to a quarterly disclosure report. ...

Northrop Grumman spent nearly $2.8M lobbying in 3Q
BusinessWeek
The defense company lobbied on homeland security spending, cyber security issues, research and development tax credits and other business issues in July through September. The spending was down slightly from the $3.02 million the company spent a year ...

2011: The year of the breach
GCN.com
The cybersecurity focus began to shift more to response and mitigation as we realized that compromise is a fact of life. “If someone really has you in their sights, they've got you,” Tim Roxey, director of risk assessment at the North American Electric ...

Lockheed Martin spent $3.87M on 3Q lobbying
BusinessWeek
... lobbying the federal government during the third quarter, focusing its efforts on military spending legislation that could affect sales of its jet fighters, missile defense systems and cyber security, according to a recent disclosure report. ...

BCS: More guidance needed on govt security policy
ashdowngroup.com
The government needs to issue further guidance to complement its recently-published Cyber Security Strategy, it has been claimed. BCS, The Chartered Institute for IT, has highlighted the need for a framework that clarifies for businesses and ...

Critics want Judiciary Committee to slow down online piracy bill
The Hill (blog)
Chaffetz's concerns were echoed by House Cybersecurity subpanel Chairman Dan Lungren (R-Calif.), who said he has heard from cybersecurity experts worried the bill will undermine critical network protections. "I don't feel comfortable supporting this ...

Top 5 Security Incidents of 2011 (and Their Impacts Going Forward)
Redmondmag.com
... hacktivisiom" groups like Anonymous and Lulzsec claiming the spotlight week after week, large corporate breaches making the the front page and cyber incidents pointing to foreign government involvement, 2011 was an eventful year in cybersecurity. ...

Accounting for cyber security - cloud service providers and ISO 27001
Lexology (registration)
The Guidance specifically states that if a company outsources functions that have materialcybersecurity risks, the company should provide a description of those functions and how the company addresses those risks. The Guidance also appears to ...

Portal up your life
ZDNet Australia
What is the Prime Minister going to do for cybersecurity and how did Telstra fail so hard? In order to post a comment, you need to be registered. (Sign In or register below) Terms of Service - As a ZDNet registrant, and by using this service, ...

NDAA internet war on American human rights defenders
Examiner.com
As part of Full Spectrum Dominance, the Pentagon's cybersecurity plan released in July declared the internet a domain of war, claiming hostile parties “are working to exploit DOD unclassified and classified networks, and some foreign intelligence ...
Your First Move For Thursday December 16th
CNBC.com (blog)
Stephen Weiss says he was going to go with managed care, singling out Aetna Mike Khuow says he likes Macy's Joe Terranova likes another name in the cyber security space: ManTech Guy Adami says he likes Entergy Karen Finerman says, “I like Covidian Pete ...

Intel spends $878K on 3rd-quarter lobbying
BusinessWeek
Other topics included cybersecurity, taxes and education funding. Intel lobbied Congress, the US Trade Representative and other federal agencies in the third quarter, according to a filing made Oct. 20 with the House clerk's office.

Enterprise Cyber Security & Information Assurance Podcast | Cyber ...
By Lee J
To celebrate the launch of the Enterprise Cyber Security & Information Assurance Summit taking place in San Jose, CA, USA, FC Business Intelligence are releasing some exclusive podcasts recorded with their host organization The Global ...
Cyber War News

House to pass bill giving cybersecurity authority to DHS | Security ...
By Media Watch
In the final weeks before Congress is expected to conclude its business for the year, nine lawmakers, including House Homeland Security Chairman Peter T. King, announced a new acybersecurity bill aimed at protecting critical infrastructure. ...
Security Debrief

SEDC » » Smart grid cybersecurity initiative launched in Netherlands
By sean
The Cyber-TEC initiative has been launched in The Netherlands as a public-private partnership oncyber security for smart grids and other critical infrastructures. The initiative aims to take a leading role in Europe on cybersecurity of critical ...
SEDC

CSC Establishes Insurance Cybersecurity Advisory Council | News ...
By Paul Harris
Recently, CSC announced the establishment of the Insurance Cybersecurity Advisory Council for life insurance and annuity providers and property/casualty insurers to help mitigate the risk of cyber attacks on the insurance industry. ...
News & Insight for the DC Area Executive

Cybersecurity for U.S. Firms?:… | AdvancingWomen.com
By admin
Cybersecurity for U.S. Firms?: The U.S. is considering information sharing between companies and the government ... http://t.co/bTt9uhpb.
AdvancingWomen.com

Testing the Limits With Richard Stiennon – Part II | Software Testing ...
By Mike Brown
In part II of our Testing the Limits interview with security expert Richard Stiennon, we get his thoughts on where companies are least prepared for a security breach; the explosion of mobile related threats; the future of cyber security and much more. If you missed the first installment, ... If you want everything, especially from the perspective of software assurance read Cybersecurity: The Essential Body Of Knowledge by Dan Shoemaker and Wm. Arthur Conklin. uTest: You're an extremely ...
Software Testing Blog

My DNS Filtering Research before House SOPA Panel « High Tech ...
By George Ou
The engineers who are claiming that DNS Filtering would break the security extension standard for DNS called DNSSEC, and thereby break Internet Cybersecurity. This is because a website whose DNS was blocked by court order cannot ...
High Tech Forum

DHS Releases New Cyber Document — “The Blueprint for a Secure ...
By Continuity_Compliance
Many postings on this website involve the topics of cyber security, cyber warfare and cyberspace – and in particular, as to how cyberspace involves elements of risk management for individuals, organizations, communities and our government. All business continuity and risk management planning ... If applicable, please pass this information along to cybersecurity risk management team members in your community and where you work. And consider this a valuable reading material ...
Continuity Compliance

The Cyber Security Casino: Betting with House Money
The Cyber Security Casino: Betting with House Money Identifying threats is an offensive tactic. It's a close monitoring of the system at hand and the cyber news ...
https://infosecisland.com/.../18770-The-Cyber-Security-Casino...

Mobile technology changes making cyber security more difficult ...
NASHVILLE, Tenn.—Mobile technology security threats will be at an all-time high , and social media will increase in popularity as conduit for social engineering ...
www.businessinsurance.com/article/20111214/.../111219949

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com