White House Sets Cybersecurity R&D Priorities

White House Sets Cybersecurity R&D Priorities
InformationWeek
By Elizabeth Montalbano InformationWeek The White House has released a roadmap that sets research and development priorities for cybersecurity to accelerate efforts to secure US network infrastructure and catalyze change in the way the nation ...
Better cyber security needed as electric grid expands: MIT report
Business Insurance
The future characteristics of the US electric grid make it especially important to develop plans for improved cyber security, says a study by the Massachusetts Institute of Technology. “With rapidly expanding connectivity and rapidly evolving threats, ...
Langevin announces cyber-security contest winners
Boston.com
Jim Langevin (LAN'-jih-vin) has announced the winners of a Rhode Island cyber-security contest for high-school students. Langevin on Wednesday said Adam Sowden, a student at Exeter West Greenwich Regional High School, took top honors in the Rhode ...
NIST 2012 budget spotlights cybersecurity
GCN.com
A National Cybersecurity Center of Excellence to be housed at NIST is funded to the tune of $10 million for the year, and $16.5 million is appropriated to support the administration's National Strategy for Trusted Identities in Cyberspace, ...
Privacy concerns over House Intelligence cybersecurity info sharing bill
FierceGovernmentIT
1 legislation (HR 3523) that would set up a cybersecurity threat information sharing mechanism between the intelligence community and the private sector. The bill continues to come under criticism from privacy advocates however, despite the inclusion ...
UK Cyber Security Strategy does not help secure the individual
eGov monitor
By Amichai Shulman, CTO and Co-founder of Imperva The UK Cyber Security Strategy analyses the problems and defines the goals well but it lacks a definite plan of action to achieve those aims says Amichai Shulman. The UK recently released a new strategy ...
House Cyber Panel Chair Proposes Placing DHS in Charge of Cybersecurity
ExecutiveGov
Cybersecurity legislation appears to be the main topic on Capitol Hill of late as Congress heads toward adjourning for the year. Last week, the House Intelligence Committee approved a bill that would allow private companies to share cyber threat ...
GTRA announces SecureGOV Council Meeting Government Award winners
PR NewsChannel (press release)
Sharing her insight and expertise and the importance of the collaboration of both private and public sectors to create solutions in the areas of cyber security included her opening keynote, 'DHS: YourCyber Security Partner,' Roberta Stempfly, ...
With Cyber Fast Track, Pentagon funds hacker research
Politico
The program's streamlined contract-award process was the result of nine months of legal wrangling, Wired magazine's Danger Room blog reported. Cyber - securityanalysts work in the ' watch and warning center ' during the first.
Companies can insure against cybercrime.
FederalNewsRadio.com
The Chubb Group of Insurance Companies is adding cybersecurity insurance to its portfolio, according to InsuranceNewsNet. The company says the new cyber coverage will help protect private companies against damages and liability if they're ever hacked. ...
Talking Cyber in Phoenix
Electric Light & Power (blog)
This week at the Grid-Interop conference in Phoenix, experts discussed practical implementations ofcybersecurity in a session focused on solutions and practices. In the session, Russ Silva from Telcordia Technologies noted that utilities are currently ...
Conference Tries To Make Sense Of Cyberspace
Aviation Week
It was known as the Office for Cyber Security and renamed following SDSR. Its job is to support ministers and the National Security Council in “determining priorities in relation to securing cyberspace.” To this end, Ocsia works with other entities, ...
Pace Charters New Cyber Institute
BankInfoSecurity.com
New York's Pace University has just announced its new Seidenberg Cyber Security Institute. What is the school's mission, and why is now the ideal time to open its doors to career-minded students? "The main reason we're doing this is there's a huge ...
Glilot Capital Partners Invests $1.5 Million in Cyber-Security Company Light Cyber
Benzinga (press release)
Glilot Capital Partners, an early-stage fund focused on Israeli-based software companies, today announced that it has signed a definitive agreement to invest $1.5 million in Light Cyber, a developer of innovative solutions for identifying, preventing, ...
NCC outstripping expectations
Stock Market Wire
StockMarketWire.com - Cyber security specialist NCC (LON:NCC)said group profit before tax for the current financial year to 31 May 2012 to be between £21.0m and £21.5m, well ahead of market consensus of £19.6m. Revenue achieved is over 27% ahead of ...
Cyber Center Joins Data Security Effort
Inside INdiana Business (press release)
Cyber security researchers at Purdue University, the universities of Texas at San Antonio and Texas at Dallas are looking to apply those same principles to data. The three universities have been awarded a five-year, $3 million grant from the National ...
Limited company IT security investment
Paystream Accounting
Limited company IT contractors could see a sharp rise in work as spending on cyber security deals is forecast to grow at ten per cent every year during the next three to five years. PwC says spending in this market will hit £3 billion in the UK alone ...
Business continuity briefs:
Continuity Central (press release)
ENISA, the EU information security agency, has launched a report on proactive detection of cyber security incidents to make 'digital fire-brigades' more effective. The report identifies 16 shortcomings in detection of network security incidents and ...
Interior Ministry suggests controversial ban on internet anonymity
RT
Moshkov, who is responsible for cyber security, added that it is on the Internet that extremist calls often appear. For instance, last year violent nationalist protests on Manege Square were organized through social networks, he recalled. ...
Information Security Critical With Increased Dependence on Virtual Technology
PR Newswire (press release)
The keynote speech titled 'Cyber Security and Cyber Threats in a Changing World' will be presented by General (Retired) Michael Hayden, former Director of the Central Intelligence Agency (CIA) and Deputy Director of the National Security Agency (NSA). ...
Information Security Forum predicts 'perfect storm' with 2012 security challenges
Response Source (press release)
You could argue that we are heading towards a 'perfect storm', where a combination of threats relating to cloud, consumerisation, cyber security and more, will come together at the same time.” The increasing consumerisation of IT in 2012 will create ...
DHC: EHR Data Target for Identity Thieves
MedPage Today
By Cole Petrochko, Associate Staff Writer, MedPage Today NEW YORK -- Medical identity theft has become one of the most lucrative forms of identity theft, according to a panel of cybersecurityspecialists. Stolen patient data -- including electronic ...
Power, regulatory experts examine challenges to upgrading transmission system
Environment & Energy Publishing
Cyber security has become a central source of debate in the smart grid discussion. Peter Fox-Penner: There is no question that our power grid is a target of cyber terrorists and hackers. We see those cyber attacks routinely and in great volume. ...
Stephen Harper and Barack Obama poised to unveil border-security deal
National Post (blog)
Sources say the agreement will include measures that lead to enhanced tracking of travellers, better cyber-security protection, joint government facilities and improved oversight of overseas cargo shipped to both countries. The announcement comes 10 ...
Hackers Battle for Global Spoils
Santa Barbara Independent
Every year, Vigna and his team create a new design to challenge participants and invent new ways to aid cyber security education for which they receive National Science Foundation funds. 2011 was the year of the money mule, which are money-laundering ...
Surveillance Technology Takes a New Twist, Morphs Again
The New American
appointed to the Cybersecurity Task Force under the Committee on Financial Services, FinFisher “provide[s] an array of tools and training to let government agents capture everything from your phone and computer, and even control it remotely without ...
Three gain Cyber Foundations honors
Providence Business News
18 in tests that challenged their skills in networking, operating systems and system administration, the most important foundational skills of effective cyber security, according to a release from US Rep. James R. Langevin, D-Warwick, who founded the ...
Splunk Opens Bethesda, Md. Office to Better Serve Federal Government Customers
MarketWatch (press release)
Next month, Splunk will open the Splunk Center of Excellence at the Bethesda office, a hands-on cybersecurity and analytics lab that will also feature a training center. The Splunk Center of Excellence will serve as the foundation for Splunk's federal ...
Upcoming hearings
Lexology (registration)
On December 6, The House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies will discuss possible cybersecurity reform measures. The Senate Energy and Natural Resources Committee will hold a ...
9 Cybersecurity Threat Predictions for 2012
Security vendor Imperva predicts what to look out for next year.
Government Technology News
Lt. General Harry Raduege: Three Top 2012 Cybersecurity “Game ...
By Brynn Koeppen
This assumption is a key realization that will shape the future of cybersecurity in 2012. There will be increased recognition that managing security is about managing risk. Each month, government agencies face an estimated 1.8 billion ...
News & Insight for the DC Area Executive
International Cooperation, Public-Private Partnerships Highlighted ...
By jim
Three key themes emerged from a Cybersecurity Insider briefing on global cybersecurity hosted by Government Executive: 1. There is the need for enhanced international cooperation on cyberdefense including an expanded role for NATO. 2. ...
FISMA Focus
Charlie Miller now working with DoD for Cyber Security ~ The ...
By noreply@blogger.com (THN Reporter)
Charlie Miller now working with DoD for Cyber Security. Charlie Miller is a former hacker who has become an information security consultant now working with Department of Defense (DoD) for helping out with cyber security. He was invited to ...
The Hacker News | Hacking News...
Federal IT executives convene to discuss budget cuts affecting cyber ...
By PR NewsChannel
Research conducted by GTRA determined that insufficient funding and being asked to 'do more with less' was the number one issue among IT executives, with specific concern on how this trend would impact cyber security. “There is plenty of ...
PR NewsChannel
Simplify Cyber Security Implementation | IT Governance Blog on IT ...
By James Warren
Effective cyber security depends on co-ordinated & integrated preparations for responding to, and recovering from, a range of possible cyber attacks. Cyber security standards enable you to mitigate these risks and implementation is simplified ...
IT Governance Blog on IT governance,...
Cybersecurity Predictions for 2012 « Your Daily Scoop
By Tom Goldsmith
Cybersecurity Predictions for 2012. By Tom Goldsmith, on December 8th, 2011. It's the time of year when the predictions start to flow, so not surprising that Cenzic, a web site security firm, has come up with a few prognostications for ...
Your Daily Scoop
Former Hacker Charlie Miller, Now Working with DoD on Cyber ...
By Rj
Former Hacker Charlie Miller, Now Working with DoD on Cyber Security. Posted by Rj December 7, 2011 Leave a Comment. Share this: Like this: Like. Be the first to like this post. « Today marks one year of the extralegal US banking ...
The Daily Attack
What's In A Name? Homeland Security Develops Domain Name System Security Extensions ...
By bobgourley
DHS's role in this effort is STs Domain Name System Security Extensions (DNSSEC) project, which received the National Cybersecurity Innovation Award at the Sans Institute's Second Annual NationalCybersecurity Innovation Conference for ...
Bob Gourley
Raytheon acquires cybersecurity vendor Pikewerks
Defense and aerospace systems vendor Raytheon has acquired cybersecurity vendor Pikewerks in an effort to add to Raytheon's capabilities to defend against ...
www.networkworld.com/.../120511-raytheon-acquires-cybers...
GAO: Agencies struggle to define cybersecurity workforce ...
Several large departments have failed to close cybersecurity workforce gaps that could ... filling empty jobs in the department's National Cyber Security Division. ...
www.federalnewsradio.com/?nid=440&sid=2650868
OSTP Announces New Cybersecurity R&D Plan | threatpost
The Office of Science and Technology Policy (OSTP) released a new report yesterday that details plans to complement the nation's existing cybersecurity policy, ...
threatpost.com/.../ostp-announces-new-cybersecurity-rd-plan-...

White House Sets Cybersecurity R&D Priorities
InformationWeek
By Elizabeth Montalbano InformationWeek The White House has released a roadmap that sets research and development priorities for cybersecurity to accelerate efforts to secure US network infrastructure and catalyze change in the way the nation ...
Better cyber security needed as electric grid expands: MIT report
Business Insurance
The future characteristics of the US electric grid make it especially important to develop plans for improved cyber security, says a study by the Massachusetts Institute of Technology. “With rapidly expanding connectivity and rapidly evolving threats, ...
Langevin announces cyber-security contest winners
Boston.com
Jim Langevin (LAN'-jih-vin) has announced the winners of a Rhode Island cyber-security contest for high-school students. Langevin on Wednesday said Adam Sowden, a student at Exeter West Greenwich Regional High School, took top honors in the Rhode ...
NIST 2012 budget spotlights cybersecurity
GCN.com
A National Cybersecurity Center of Excellence to be housed at NIST is funded to the tune of $10 million for the year, and $16.5 million is appropriated to support the administration's National Strategy for Trusted Identities in Cyberspace, ...
Privacy concerns over House Intelligence cybersecurity info sharing bill
FierceGovernmentIT
1 legislation (HR 3523) that would set up a cybersecurity threat information sharing mechanism between the intelligence community and the private sector. The bill continues to come under criticism from privacy advocates however, despite the inclusion ...
UK Cyber Security Strategy does not help secure the individual
eGov monitor
By Amichai Shulman, CTO and Co-founder of Imperva The UK Cyber Security Strategy analyses the problems and defines the goals well but it lacks a definite plan of action to achieve those aims says Amichai Shulman. The UK recently released a new strategy ...
House Cyber Panel Chair Proposes Placing DHS in Charge of Cybersecurity
ExecutiveGov
Cybersecurity legislation appears to be the main topic on Capitol Hill of late as Congress heads toward adjourning for the year. Last week, the House Intelligence Committee approved a bill that would allow private companies to share cyber threat ...
GTRA announces SecureGOV Council Meeting Government Award winners
PR NewsChannel (press release)
Sharing her insight and expertise and the importance of the collaboration of both private and public sectors to create solutions in the areas of cyber security included her opening keynote, 'DHS: YourCyber Security Partner,' Roberta Stempfly, ...
With Cyber Fast Track, Pentagon funds hacker research
Politico
The program's streamlined contract-award process was the result of nine months of legal wrangling, Wired magazine's Danger Room blog reported. Cyber - securityanalysts work in the ' watch and warning center ' during the first.
Companies can insure against cybercrime.
FederalNewsRadio.com
The Chubb Group of Insurance Companies is adding cybersecurity insurance to its portfolio, according to InsuranceNewsNet. The company says the new cyber coverage will help protect private companies against damages and liability if they're ever hacked. ...
Talking Cyber in Phoenix
Electric Light & Power (blog)
This week at the Grid-Interop conference in Phoenix, experts discussed practical implementations ofcybersecurity in a session focused on solutions and practices. In the session, Russ Silva from Telcordia Technologies noted that utilities are currently ...
Conference Tries To Make Sense Of Cyberspace
Aviation Week
It was known as the Office for Cyber Security and renamed following SDSR. Its job is to support ministers and the National Security Council in “determining priorities in relation to securing cyberspace.” To this end, Ocsia works with other entities, ...
Pace Charters New Cyber Institute
BankInfoSecurity.com
New York's Pace University has just announced its new Seidenberg Cyber Security Institute. What is the school's mission, and why is now the ideal time to open its doors to career-minded students? "The main reason we're doing this is there's a huge ...
Glilot Capital Partners Invests $1.5 Million in Cyber-Security Company Light Cyber
Benzinga (press release)
Glilot Capital Partners, an early-stage fund focused on Israeli-based software companies, today announced that it has signed a definitive agreement to invest $1.5 million in Light Cyber, a developer of innovative solutions for identifying, preventing, ...
NCC outstripping expectations
Stock Market Wire
StockMarketWire.com - Cyber security specialist NCC (LON:NCC)said group profit before tax for the current financial year to 31 May 2012 to be between £21.0m and £21.5m, well ahead of market consensus of £19.6m. Revenue achieved is over 27% ahead of ...
Cyber Center Joins Data Security Effort
Inside INdiana Business (press release)
Cyber security researchers at Purdue University, the universities of Texas at San Antonio and Texas at Dallas are looking to apply those same principles to data. The three universities have been awarded a five-year, $3 million grant from the National ...
Limited company IT security investment
Paystream Accounting
Limited company IT contractors could see a sharp rise in work as spending on cyber security deals is forecast to grow at ten per cent every year during the next three to five years. PwC says spending in this market will hit £3 billion in the UK alone ...
Business continuity briefs:
Continuity Central (press release)
ENISA, the EU information security agency, has launched a report on proactive detection of cyber security incidents to make 'digital fire-brigades' more effective. The report identifies 16 shortcomings in detection of network security incidents and ...
Interior Ministry suggests controversial ban on internet anonymity
RT
Moshkov, who is responsible for cyber security, added that it is on the Internet that extremist calls often appear. For instance, last year violent nationalist protests on Manege Square were organized through social networks, he recalled. ...
Information Security Critical With Increased Dependence on Virtual Technology
PR Newswire (press release)
The keynote speech titled 'Cyber Security and Cyber Threats in a Changing World' will be presented by General (Retired) Michael Hayden, former Director of the Central Intelligence Agency (CIA) and Deputy Director of the National Security Agency (NSA). ...
Information Security Forum predicts 'perfect storm' with 2012 security challenges
Response Source (press release)
You could argue that we are heading towards a 'perfect storm', where a combination of threats relating to cloud, consumerisation, cyber security and more, will come together at the same time.” The increasing consumerisation of IT in 2012 will create ...
DHC: EHR Data Target for Identity Thieves
MedPage Today
By Cole Petrochko, Associate Staff Writer, MedPage Today NEW YORK -- Medical identity theft has become one of the most lucrative forms of identity theft, according to a panel of cybersecurityspecialists. Stolen patient data -- including electronic ...
Power, regulatory experts examine challenges to upgrading transmission system
Environment & Energy Publishing
Cyber security has become a central source of debate in the smart grid discussion. Peter Fox-Penner: There is no question that our power grid is a target of cyber terrorists and hackers. We see those cyber attacks routinely and in great volume. ...
Stephen Harper and Barack Obama poised to unveil border-security deal
National Post (blog)
Sources say the agreement will include measures that lead to enhanced tracking of travellers, better cyber-security protection, joint government facilities and improved oversight of overseas cargo shipped to both countries. The announcement comes 10 ...
Hackers Battle for Global Spoils
Santa Barbara Independent
Every year, Vigna and his team create a new design to challenge participants and invent new ways to aid cyber security education for which they receive National Science Foundation funds. 2011 was the year of the money mule, which are money-laundering ...
Surveillance Technology Takes a New Twist, Morphs Again
The New American
appointed to the Cybersecurity Task Force under the Committee on Financial Services, FinFisher “provide[s] an array of tools and training to let government agents capture everything from your phone and computer, and even control it remotely without ...
Three gain Cyber Foundations honors
Providence Business News
18 in tests that challenged their skills in networking, operating systems and system administration, the most important foundational skills of effective cyber security, according to a release from US Rep. James R. Langevin, D-Warwick, who founded the ...
Splunk Opens Bethesda, Md. Office to Better Serve Federal Government Customers
MarketWatch (press release)
Next month, Splunk will open the Splunk Center of Excellence at the Bethesda office, a hands-on cybersecurity and analytics lab that will also feature a training center. The Splunk Center of Excellence will serve as the foundation for Splunk's federal ...
Upcoming hearings
Lexology (registration)
On December 6, The House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies will discuss possible cybersecurity reform measures. The Senate Energy and Natural Resources Committee will hold a ...
9 Cybersecurity Threat Predictions for 2012
Security vendor Imperva predicts what to look out for next year.
Government Technology News
Lt. General Harry Raduege: Three Top 2012 Cybersecurity “Game ...
By Brynn Koeppen
This assumption is a key realization that will shape the future of cybersecurity in 2012. There will be increased recognition that managing security is about managing risk. Each month, government agencies face an estimated 1.8 billion ...
News & Insight for the DC Area Executive
International Cooperation, Public-Private Partnerships Highlighted ...
By jim
Three key themes emerged from a Cybersecurity Insider briefing on global cybersecurity hosted by Government Executive: 1. There is the need for enhanced international cooperation on cyberdefense including an expanded role for NATO. 2. ...
FISMA Focus
Charlie Miller now working with DoD for Cyber Security ~ The ...
By noreply@blogger.com (THN Reporter)
Charlie Miller now working with DoD for Cyber Security. Charlie Miller is a former hacker who has become an information security consultant now working with Department of Defense (DoD) for helping out with cyber security. He was invited to ...
The Hacker News | Hacking News...
Federal IT executives convene to discuss budget cuts affecting cyber ...
By PR NewsChannel
Research conducted by GTRA determined that insufficient funding and being asked to 'do more with less' was the number one issue among IT executives, with specific concern on how this trend would impact cyber security. “There is plenty of ...
PR NewsChannel
Simplify Cyber Security Implementation | IT Governance Blog on IT ...
By James Warren
Effective cyber security depends on co-ordinated & integrated preparations for responding to, and recovering from, a range of possible cyber attacks. Cyber security standards enable you to mitigate these risks and implementation is simplified ...
IT Governance Blog on IT governance,...
Cybersecurity Predictions for 2012 « Your Daily Scoop
By Tom Goldsmith
Cybersecurity Predictions for 2012. By Tom Goldsmith, on December 8th, 2011. It's the time of year when the predictions start to flow, so not surprising that Cenzic, a web site security firm, has come up with a few prognostications for ...
Your Daily Scoop
Former Hacker Charlie Miller, Now Working with DoD on Cyber ...
By Rj
Former Hacker Charlie Miller, Now Working with DoD on Cyber Security. Posted by Rj December 7, 2011 Leave a Comment. Share this: Like this: Like. Be the first to like this post. « Today marks one year of the extralegal US banking ...
The Daily Attack
What's In A Name? Homeland Security Develops Domain Name System Security Extensions ...
By bobgourley
DHS's role in this effort is STs Domain Name System Security Extensions (DNSSEC) project, which received the National Cybersecurity Innovation Award at the Sans Institute's Second Annual NationalCybersecurity Innovation Conference for ...
Bob Gourley
Raytheon acquires cybersecurity vendor Pikewerks
Defense and aerospace systems vendor Raytheon has acquired cybersecurity vendor Pikewerks in an effort to add to Raytheon's capabilities to defend against ...
www.networkworld.com/.../120511-raytheon-acquires-cybers...
GAO: Agencies struggle to define cybersecurity workforce ...
Several large departments have failed to close cybersecurity workforce gaps that could ... filling empty jobs in the department's National Cyber Security Division. ...
www.federalnewsradio.com/?nid=440&sid=2650868
OSTP Announces New Cybersecurity R&D Plan | threatpost
The Office of Science and Technology Policy (OSTP) released a new report yesterday that details plans to complement the nation's existing cybersecurity policy, ...
threatpost.com/.../ostp-announces-new-cybersecurity-rd-plan-...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com