Technology trends of 2011: hacktivism, cyber security . . .

Technology trends of 2011: year in review
Telegraph.co.uk
But it is clear hacktivism is here to stay as something corporations and governments must be wary of as cyber security moves up the agenda. Sony suffered arguably the most damaging attack of the year, when 77 million PlayStation Network users' personal...

Telegraph.co.uk

Firms team for NATO cybersecurity work
UPI.com
21 (UPI) -- Italy's Finmeccanica and US company Northrop Grumman have joined to help NATO boost its ability to quickly detect and respond to cybersecurity threats. The companies announced an agreement to try to win work on the NATO Computer Incident ...

Europe's maritime cyber security "non-existent"
CSO Magazine
The EU's information security agency has labelled its maritime sector a cyber security blackspot that has almost no awareness of the threat. "It was clearly noted that the awareness regarding cyber security aspects is either at a very low level or even ...

Cyber-security in Qatar: a 21st century solution
Gulf Times
However, this reliance upon cyber-space brings with it new vulnerabilities and threats from myriad actors and cyber-security is increasingly recognised as a major priority for governments. Cyber-attacks can have many different aims; to disrupt critical ...

Vigilant Software presents nine steps to a cybersecurity risk assessment
TopWireNews (press release)
/EINPresswire.com/ Vigilant Software Ltd, the one-stop shop for cybersecurity risk assessment, has identified nine steps to a cybersecurity risk assessment, which will help organisations assess potential threats that can affect their business ...

MVCC unveils cybersecurity training lab at Rome campus
WKTV
By JOLEEN FERRIS ROME, NY (WKTV) - Mohawk Valley Community College unveiled its cyber-security training lab at its Rome campus on Tuesday. The school has a three-year, $2.8 million grant to train 2500 students, at no cost to them or the companies that ...

Smart grid security: New legislation could lessen cybersecurity risks
Smart Grid News
By Jesse Berst A bill has been introduced in the House that would require the US Department of Homeland Security to evaluate cybersecurity risks to critical infrastructure (including the power grid) and then to determine ways to lessen those risks. ...

Smart Grid News

Will Kim Jong Un be for cyberwarfare what his dad was for nukes?
Network World
Two cyber security experts have different views on the matter. There is general agreement that the transition of power could bring significant instability to the region. While the dictator's son, Kim Jong Un, was named by his father to succeed him, ...

Obama Appoints Privacy Board Members
InformationWeek
Board is designed to oversee privacy and civil liberties protections built into the administration's cybersecurity legislative proposal. By Elizabeth Montalbano InformationWeek President Obama has made three nominations to a board that will oversee the ...

Cyber Scholarships Awarded
Nextgov
By Brittany Ballenstedt 12/20/11 12:47 pm ET This year's US Cyber Challenge's fall competition drew more than 2000 high school students from around the country, and five top students walked away with scholarships in the cybersecurity field. ...

Altering how the Internet works but not understanding it
The Hill (blog)
This required filtering is not likely to be feasible technically but would certainly interfere with a newcybersecurity system the government and industry has spent the last ten years developing. Rep. Zoe Lofgren, D-California, said “ignorance is ...

White House Moves To Future-Proof Government IT
InformationWeek
Federal CIO Steven VanRoekel's priorities for 2012 include making sure IT investments pay off, shared services, cloud computing, data center consolidation, and cybersecurity. By J. Nicholas Hoover InformationWeek The White House plans to require ...

Paul Croll Is Awarded 2012 IEEE Computer Society Hans Karlsson Award
San Francisco Chronicle (press release)
Croll is a Fellow in CSC's Defense Group, where he is responsible for researching, developing, and deploying systems and software engineering practices, including those for cybersecurity. He also serves as chief scientist for CSC's Defense & Maritime ...

Northrop, Finmeccanica team up for NATO cyber project
Washington Technology
By Nick Wakeman Northrop Grumman Corp. and the Italian defense contractor Finmeccanica have signed a teaming agreement to pursue a NATO contract for cybersecurity. The companies are chasing the NATO Computer Incident Response Capability, which will be ...

White & Case LLP | The SEC Focuses on Cyber Security and Related Disclosure ...
Linex Legal (press release) (registration)
1 - Cybersecurity is the body of technologies, processes and practices designed to protect networks, systems, computers, programs and data from attack, damage or unauthorized access. See Whatis?com, available at ...

Beyond the Border is too timid
Winnipeg Free Press
The key areas of co-operation laid out in the plan would create new integrated programs to enhance security (by addressing threats early, improving cross-border law enforcement and developing new infrastructure and cyber-security capacities) and to ...

State adds 4300 jobs as unemployment rate falls to 6.9 percent
Gazette.Net: Maryland Community News Online
Cybersecurity continues to play a large role in the state, he said. “Maryland has a great opportunity to become the center of cybersecurity in the nation,” Irani said. Sectors with job boosts in November from October included retail, 2600; ...

Security Threats Aren't Always Mysterious Hackers (Video)
Business Insider
We've discussed cybersecurity and security threats a lot on Smallbiztechnology.com, and seemed to have painted a picture of the security threat as malicious hackers or malevolent code. But, in this video below from Verizon, we learn that sometimes, ...

Business News-Chamber of Commerce hack
NPR
The Wall Street Journal reports the attacks targeted employees who focus on Asia policy. The FBI discovered the breach in 2010 and alerted the Chamber, which has since worked to overhaul itscyber-security system.

Agiliance Unveils Top 5 IT Security Predictions for 2012
MarketWatch (press release)
As a result, Agiliance predicts that the increase in cyber security attacks and data breaches will lead to the introduction of a formal information sharing database that will be made accessible to a broader group. Risk is Security's New Compliance With ...

2012: 5 reasons it's not the end of the world (and 5 reasons to worry)
GCN.com
And the Homeland Security Department has appointed an actual technologist with cybersecurityexperience, Mark Weatherford, as its first deputy undersecretary for cybersecurity. It doesn't mean everyone's problems are solved, but it's a step in the ...

Congress trims funds for high-tech surveillance
FederalNewsRadio.com
The money stays for cybersecurity staff and tracking terrorist money. One change in the new measure: Families of intelligence officers will get the same financial help for burial expenses as those of uniformed military, if officers are killed by ...

ISC8 Strengthens Corporate Development Naming Marcus A. Williams as Senior ...
MarketWatch (press release)
About ISC8ISC8 is actively engaged in the development and sale of intelligent Cybersecuritysolutions for information technology (IT) for commercial and government environments worldwide. To provide multiple hardware, software and cloud-based product ...

Greatest Security Risks to a Wide Area Network
Business 2 Community
Harmful threats can downgrade business reputation of your system thus different types of cyber security breaches lead to great destruction of what one might be aware of. Following are a few benefits of installing a cyber security system as mentioned ...

EU Awards Grants to Top US Public Policy Institutes
MarketWatch (press release)
Center for Strategic and International Studies, Transatlantic Cyber security Dialogue: Principles for a Secure Global Cyber Infrastructure. Migration Policy Institute, Immigration: Skills and Mobility in the Transatlantic Labor Market.

How hackers gave Subway a $30 million lesson in point-of-sale security
Ars Technica
But it wouldn't have taken cyber-security genius to figure out something was amiss. The dump site domains registered by the hackers included "tushtime.info" and "justfuckit.info" —which, if any sort of traffic logging was done on POS systems, ...

FBI To Get More Cyber Crime Agents
InformationWeek
The FBI has also requested additional funding relating to the Comprehensive National CybersecurityInitiative (CNCI), and in particular for the National Cyber Investigative Joint Task Force (NCIJTF) that it coordinates. FBI officials want the task ...

Young: Studying in Science Can Lead To Career
St. Ignace News (subscription)
By Matt Mikus Robert “Rocky” Young, a cyber security analyst who has worked in the US Air Force and the Department of Defense, showed students at St. Ignace Middle School and LaSalle High School that, with hard work, creative thinking, and following ...

Should we move the smart grid to the cloud?
Smart Grid News
They simply won't be able to afford the hardware, software and personnel to manage Big Data and to implement robust cyber security. And then there is Telvent's Jeffrey Meyers, who says what we really need is a partly cloudy grid. ...

Smart Grid News

Redfern Integrated Optics (RIO) Completed First Phase of PLANEX(TM) Laser ...
MarketWatch (press release)
Building on its Bell Labs heritage, LGS delivers advanced networking and communications solutions, including Advanced Multimedia/RF, cybersecurity, and Photonics R&D and product development. For more information, please visit www.lgsinnovations.com .

Iran hosts local websites to avoid cyber attacks
Xinhua
In August, Jalali said that Iran planned to hold a massive "cyber security maneuver" to enhance readiness against possible cyber attacks against the country and to assess the ability of its organizations and departments to prevent cyber intrusions. ...

Tech hiring to grow in 1Q 2012
SignOnSanDiego.com
The categories that respondents were having the biggest challenges in finding skilled workers were network administration and cyber security. 42 percent said they were pretty confident that their companies would launch new IT projects during the ...

Maryland sees improvement in jobs picture
Baltimore Sun
Irani, with Towson University, sees the possibility that cybersecurity — a relatively new focus for the federal government — could help offset some losses. The US Cyber Command is based at Fort Meade. Maryland businesses started the year full of ...

In WikiLeaks Case, Bradley Manning Faces the Hacker Who Turned Him In
Wired News
... Agent Antonio Patrick Edwards, who works for the Army's Computer Crime Investigation Unit, testified that he got the chats from Lamo after receiving an e-mail from Chet Uber, a civilian who worked with Lamo as part of a cyber security initiative....

Wired News

Two firms join NATO to help with cyber security
By Lee J
United Nations, known by millions, hated by activist of the modern day and insight of hackers from all corners of the globe, U.N has announce the partnership with 2 firms for cyber security purpose's.
Cyber War News

Holiday Mobile Device Shoppers Take Heed: New Study by ...
Holiday Mobile Device Shoppers Take Heed: New Study by National Cyber Security Alliance and McAfee Reveals Lack of Cyber Safety Among Mobile Users.
ITbriefing.net

Chinese Hacker Has No Technical Training, Claims Himself As ...
By Chris Chang
... people haven't realised that there are hackers who can attack them. They probably think they have the best security possible.” One thing we are sure of: the Chinese government has privileged access to these cyber security experts' work. ...
M.I.C. Gadget

U.S. Chamber of Commerce | Chinese hackers | cybersecurity | The ...
By Joshua Peterson
U.S. Chamber of Commerce attacked by Chinese hackers | 'The complex operation, which involved at least 300 Internet addresses, was discovered and quietly shut down in May 2010'
The Daily Caller

Why I Oppose The 12 Chinese Hacker Groups Claim | Digital Dao
By Jeffrey Carr
The cybersecurity analysts and experts quoted in the article from Mandiant and Dell SecureWorks have 1) a vested interest in painting China as the bad guy since the bulk of their marketing is APT-centric (APT being a code word for China) ...
Digital Dao

ENISA Report on Maritime Cyber Security
ENISA Report on Maritime Cyber Security Due to the high complexity, it is major ... Over 140000 Children Victims of Identity Fraud Yearly · Cybersecurity: Free ...
https://www.infosecisland.com/.../18936-ENISA-Report-on-M...

Morning Security Brief: Arrest Records, Maritime Cybersecurity ...
“This report positions maritime cyber security as a logical and crucial next step in the global protection efforts of ICT infrastructure,” said European Network and ...
www.securitymanagement.com/.../morning-security-brief-arre...

National Guardsmen, the new front line in cybersecurity | Homeland ...
CybersecurityNational Guardsmen, the new front line in cybersecurity. Published 19 December, 2011 - 08:00.  In an aggressive push to ...
homelandsecuritynewswire.net/dr20111219-national-guardsm...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com