White House Releases Cyber-Security RandD Program Priorities

White House Releases Cyber-Security RandD Program Priorities
eWeek
In order to secure the nation's computer networks from cyber-attack, the federal government has outlined its research and development priorities for cyber-security. The Obama Administration has outlined its road map of priorities for government ...
The Circuit: AT&T, T-Mobile hearing; Cybersecurity and 'Buckshot Yankee ...
Washington Post (blog)
Cybersecurity transformed by “Buckshot Yankee”: The US completely changed its approach tocybersecurity after finding a piece of malicious software deep inside the military's computer systems in 2008, The Washington Post reported. ...
Cyber Security Bill Seeks to Boost Information Sharing
Infoboom
A cyber security bill introduced last week aims to promote greater information sharing between the federal government and US businesses. The Cyber Intelligence Sharing and Protection Act of 2011 (HR 3523), which cleared the House Permanent Select ...
White House begins comprehensive cybersecurity quest
FederalNewsRadio.com
By Michael O'Connell The White House launched a new chapter in its epic quest for comprehensive cybersecurity on Tuesday, with the release of its strategic plan for cybersecurity research and development. Federal chief technology officer Aneesh Chopra ...
Nation states seen as biggest cybersecurity threat
Nextgov
By Andrew Lapin 12/08/2011 A prominent cybersecurity expert and the Estonian ambassador to the United States cautioned government insiders Thursday to be mindful of the significant threat that coordinated attacks by nation states can pose to a ...
UK can help boost cyber security
New Straits Times
LANGKAWI: Britain is ready to help Malaysia beef up its cyber security defences, said its international security strategy minister Gerald Howarth. He said that lessons learnt following the Sept 11, 2001 terror attacks on the United States served as a ...
Q&A: Roger Halbheer, Global Security Advisor, Microsoft
Business Standard
This made us think about what is needed to run a successful cyber security agenda within a country. What are the themes which ought to be addressed and in which form? We came up with two papers about it - a cybersecurity white paper abstract and ...
Report: Electric-grid cybersecurity too fragmented
FederalNewsRadio.com
In a report, "The Future of the Electric Grid," Grochow and a colleague laid out a number of proposals to better secure the grid, including a single agency devoted to electric-grid cybersecurity.
Black Hat Abu Dhabi Briefings Highlight Cyber and Forensic Security
PR Newswire (press release)
Through sessions covering malware, mobile security, denial-of-service-attacks and the blue-hat contest cyber security and forensic security vulnerabilities and trends are highlighted. Travis Carelock, Technical Director at Black Hat, said, ...
NIST Budget Shows Some Shift Toward Cybersecurity
ExecutiveGov
Government agencies say they are ever-focused on cybersecurity and the National Institute of Standards and Technology appears to be an example of that. The signed Consolidated and Continuing Appropriations Act of 2012 gives NIST $750.8 million for ...
Who's Keeping the UK Safe Online?
Kings of War
by Clement Guitton on 9 December 2011 · 0 comments A few days ago, I attended an event about the new British cyber security strategy. Three members of the Office for Cyber Security and Information Assurance answered questions about the strategy. ...
Education briefs
Baltimore Sun
The college has several classrooms equipped with the latest cybersecurity technology to train students. The first scholarship will be awarded next fall. Scholarships can cover tuition and fees, books, a computer and educational supplies. ...
Cybersecurity and the Public Company: Keeping Your Disclosures Safe and Sound ...
JD Supra (press release)
For many public companies, the risks associated with cybersecurity have increased, and the attendant disclosure of those risks has become an important area of focus in periodic reports filed under the Securities Exchange Act of 1934, as amended (the ...
How handheld devices are driving innovation at federal agencies
FederalNewsRadio.com
She founded EmeSec, a cybersecurity firm, in 2003 and serves as its CEO. Horton said the mobile revolution faced by government and contractors is one that is also taking place more broadly across society. "Our infrastructure is changing in America ...
Top 10 cyber threat predictions for 2012
FederalNewsRadio.com
This is also when the top ten "cybersecurity predictions" are listed. Sys-Con has done us all a favor and aggregated a bunch of these lists. SANS says that custom malware, IPv6 and social media are big security issues for 2012. ...
10-Q: SCIENCE APPLICATIONS INTERNATIONAL CORP
Middle East North Africa Financial Network
We are a provider of scientific, engineering, systems integration and technical services and solutions in the areas of defense, health, energy, infrastructure, intelligence, surveillance, reconnaissance andcybersecurity to all agencies of the US ...
ADARA Networks CEO Eric Johnson Featured as the VIP Speaker at The Security ...
MarketWatch (press release)
As part of that, Mr. Johnson highlighted how ADARA addresses the issue of cyber security, allowing for the secure delivery of mission critical information across disparate networks. "ADARA's mission is to help organizations streamline operations by ...
Cybersecurity legislation would authorize information sharing with certified ...
Lexology (registration)
Most observers agree that one of the key components of an effective national cybersecurity strategy is the bidirectional and timely sharing of cyber threat information between the Federal Government and the private sector. On November 30, leaders of ...
Operation Buckshot Yankee: Key players and networks infected
Washington Post
Key players in Operation Buckshot Yankee, an operation designed to neutralize malware that transformed the government's approach to cybersecurity. Read more about the operation here. The key players Agent.btz Malicious computer software that was ...
Taskforce to investigate feasibility of taxing Australian online shoppers
NEWS.com.au
A cyber security expert offers way to shop more safely online. Australia's largest retailers have launched a new ad campaign to pressure the government to impose GST on online purchases from overseas. GST-FREE: The Federal Government is looking at the ...
ISO27001 compliance database keeps UK companies up to date with laws and ...
TopWireNews (press release)
Since the new UK Government's Cyber Security Strategy was published in November, there is an even greater incentive for all industries to familiarise themselves with the existing legislation and adhere to those laws relevant them. ...
NCC Group raises profit forecast
Financial Times
By Alexandra Stevenson NCC Group said FTSE 100 companies were spending more on keeping their networks secure, as the cybersecurity group raised its profit forecast for the year. The news sent the shares up 15 per cent on Thursday. ...
Workers' personal devices can pose risk to company security
Denver Business Journal
But BYOD creates security risks that many companies overlook at a time when US businesses and government organizations are targets of unprecedented cyber attacks, according to experts at the Billington CyberSecurity Summit, held Dec. 5 in Denver. ...
Payments Council and Government tackle e-crime
Stock Market Wire
James Brokenshire MP, Minister for Crime and Security at the Home Office, provided the keynote speech at the event and highlighted the Government's new Cyber Security Strategy, which was published on 25th November. The Minister focused on how the UK ...
Invasion of a different sort started with thumb drive
Stars and Stripes
Whether it's a lone hacker sniffing around a Department of Defense network or a foreign intelligence service bent on stealing classified data, cyber security remains of utmost concern to the US government, particularly to service members and diplomats. ...
Lakewood student shines in national Cyber Foundations Competition
Sun Star Courier
Students took quizzes on the different fields of cyber security including networking, operating systems and system administration. Seven other Lakewood students received honorable mentions for placing in the top 500 nationally. ...
Lockheed Martin warns of critical cyber vulnerability
Computing
Adobe advised users of the zero-day (which is cyber security speak for 'not previously known') vulnerability this week in a message on its site. It explained that the issue could affect even the latest patched version of both programmes, and described ...
Encryptics® Announces Encryptics Pro® Read Receipt Product Enhancement
PR Web (press release)
Encryptics® CEO, Brandon Hart, announced new enhancements to their Encryptics Pro® cyber security software solution. Read Receipt is the first such feature to be introduced. “Encryptics values an email authors' control, and provides all authors the ...
Your employees are the biggest threat to your data
Jacksonville Business Journal
Seth Oxhandler is CEO of Coolcat Inc. His company provides cyber security services including computer forensics, ethical hacking and network penetration testing. Expect emerging cyber threats in 2012 to include links to malicious websites appearing ...
Intelligent Decisions, Inc., Partners with Centrify to Deliver Integrated IT ...
DigitalJournal.com (press release)
Specifically, Centrify software will be combined with ID's Cloud, Network Convergence and Cyber Security Practices to provide agencies and organizations with control over which systems users can access, how they access those systems, what privileges ...
SAIC Inc. Reports Operating Results (10-Q)
GuruFocus.com
Intelligence and Cybersecurity Solutions revenues increased $98 million, or 4%, substantially all of which was internal revenue growth, for the nine months ended October 31, 2011 as compared to the same period in the prior year. ...
Utility SCADA Systems Remain a Key Point of Security Vulnerability in Smart ...
MarketWatch (press release)
Many of those requests simply stated a list of infrastructure components, without adequate consideration of cyber security requirements. As a result of these two developments, the utility industry now has a large installed base of smart grid components ...
Federal officials launch FedRamp
FierceGovernmentIT
8 the launch of FedRamp, an effort for low- and moderate- risk cloud services to gain common cybersecurity certification under the Federal Information Security Management Act. In a call with reporters, Federal Chief Information Officer Steven VanRoekel ...
China's economic role in 2012: four views
SmartPlanet.com (blog)
James Mulvenon, director of the China Division of the Center for Intelligence Research & Analysis, warned in no uncertain terms that the Asian nation's growing strength will adversely affect cybersecurity. Emerging economies will lock arms with ...
Business continuity BS25999 training course comes with a free e-book reader
TopWireNews (press release)
Business continuity is a key part of risk management and, therefore, is closely related to the cybersecurity of any organisations. It deals with the risk of business activities or processes being interrupted by external factors. ...
Quoted: on cyberwar's rules of engagement
Good Morning Silicon Valley (blog)
The Washington Post's look at the US approach to cybersecurity — which in huge part is a reaction to a 2008 breach of military computer systems — shows that cyberwar's rules of engagement remain unclear, for reasons ranging from its relative newness ...
Freakonomics vs Cybersecurity
By Robert Graham
The second, and more common use of economics (in the field of cybersecurity), is the political attempt to prove that there is some sort of "market failure" that means we get to punish Microsoft for its vulnerabilities. While the conclusion is faulty, ...
Errata Security
"Enter at your own Risk" Cyber Security Awareness Campaign ~ The ...
By THN Reporter
Cyber Security Awareness Campaign. The Hacker News & 6 Other Top IT Security Sites are Sponsoring a Special Edition January 2012 Magazine, That Features Articles & Commentaries onCyber Security From : 1.) The Hacker News. 2. ...
The Hacker News | Hacking News...
Should Cyber Security Focus More on Users? | NovaInfosecPortal.com
By judykavuo
Cybersecurity Conference & Exposition. Washington, DC ... Should Cyber Security Focus More on Users? ... Now, researchers at the Maryland Cybersecurity Center have reaffirmed that security measures must aim at users, not just attackers. ...
NovaInfosecPortal.com
Cyber Security Visualization – Grand Challenge
By Raffael Marty
Security data visualization, security information management, log analysis / management, risk management, and compliance discussed by Raffael Marty.
The “Enter At Your Own Risk” Cyber Awareness Campaign Needs ...
By Lee
Together we can all play our part in raising awareness of the latest cyber security issues. As I'm sure you all know, the weakest link in any security scenario often tends to be the end user. By working together we can empower home users, ...
Security FAQs
The Cyber Security Industrial Complex - Technology Review
Documents point to a huge industry that provides online surveillance tools to governments and police agencies.
www.technologyreview.com/computing/39250/
GAO-12-8 Cybersecurity Human Capital: Initiatives Need Better ...
Reported being able to find qualified cybersecurity staff to fill positions generally, but a component—the National. Cyber Security Division—has had trouble ...
cryptome.org/0005/gao-12-8.pdf
Federal Cyber Security R and D Strategy Released
Federal Cyber Security R and D Strategy Released "Sustained efforts in these ... The strategy is designed to foster improvements in cybersecurity research and ...
https://www.infosecisland.com/.../18574-Federal-Cyber-Securi...
Morning Security Brief: New Cybersecurity Bill, Officers Suing For ...
Morning Security Brief: New Cybersecurity Bill, Officers Suing For Discrimination, Largest Child Porn Bust, and More. By Carlton Purvis. 12/05/2011 -.
www.securitymanagement.com/.../morning-security-brief-new...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com