Cybersecurity, Google privacy, Megaupload

The Circuit: Cybersecurity, Google privacy, Megaupload
Washington Post (blog)
By Hayley Tsukayama LEADING THE DAY: The Senate will turn its attention to cybersecuritylegislation this week. A vote on an as-yet-unreleased comprehensive cybersecurity legislation is scheduled for this week, The Hill reported, and it could face some ...

The Cyber Security Market 2012-2022
Sacramento Bee
As a consequence, Visiongain has determined that the value of the global cyber security market in 2012 will reach $61.10bn. Cyber security operations, solutions, and products are now standard across business, government, military, and personal networks ...

How to tackle cybersecurity
Politico
The Senate is about to consider cybersecurity legislation. Ensuring the integrity and safety of our nation's critical infrastructure is a bipartisan issue that Congress and President Barack Obama must work together to tackle.

Politico

Senate cybersecurity bill sparking concerns about government control
The Hill (blog)
By Gautham Nagesh - 01/29/12 01:38 PM ET A comprehensive cybersecurity bill set for a vote in the Senate this week is drawing some late concern from the tech industry that could threaten several years of legislative work. The bill has not been released ...

Israel, Finland and Sweden top for computer security
Financial Times
By James Blitz in London Israel, Finland and Sweden are judged to be the nations which are most resilient to cyberattacks on their public and private computer systems, according to an in-depth study into cybersecurity published on Monday by a ...

Auto Hacking Seen as Growing Risk With Electronics Frenzy: Cars
BusinessWeek
While safety and entertainment systems are intended to be separate, “it is not evident that this separation has been adequately designed for cybersecurity concerns,” the academy wrote. It agreed with US regulators who said they found no evidence the ...

CyberPoint Recognized by Baltimore Magazine as One of the "Best Places to Work ...
MarketWatch (press release)
30, 2012 /PRNewswire via COMTEX/ -- CyberPoint International, LLC, a global provider of cyber security products, solutions, and services, has been recognized as one of Baltimore Magazine's "Best Places to Work 2012." This is the second consecutive year ...

Global Cyber Regulations Needed to Combat Attacks, Study Finds
Bloomberg
Global cybersecurity standards are needed to prevent attacks against power grids, communications networks and financial institutions, a study for Internet- security provider McAfee Inc. (MFE) found. The US and other countries should create regulations ...

Malaysia Hopes For GCSA To Be Set Up Soon - Ongkili
Bernama
BANGI, Jan 30 (Bernama) -- Malaysia hopes the establishment of the Global Cyber SecurityAlliance (GCSA) could be expedited in efforts to strengthen its cyber defence capabilities, especially involving the Critical National Information Infrastructure ...

Baltimore's Lookingglass raises $5 million round of financing
Baltimore Sun (blog)
Lookingglass Cyber Solutions, a Baltimore firm which makes some cool cyber security software that gives organizations global insight into cyber threats, said Monday morning that it raised $5 million in a series A round of financing.

How Should Hyperlocal Sites Handle User Information?
Street Fight
In a speech before the National Cyber Security Alliance on January 26, 2012 in Washington, Commissioner Brill insisted that greater transparency must be provided to users about what is being done with their personal information.

Street Fight

Senate OKs anti-cybercrime bill
GMA News
The Information and Communications Technology Office of the Department of Science and Technology shall likewise create a National Cyber Security Center to help in the formulation and implementation of a national cybersecurity policy.

Keeping personal information from cyber crime
University Daily Kansan
“Cyber security isn't just about credit information or social security numbers, it's also about your privacy and personal information,” said David Day, communications coordinator for the University. Day said that one of the simplest ways to remain ...

Trend Micro shares tips to protect privacy
Business Mirror
Trend Micro joins the National Cyber Security Alliance and several other notable institutions in celebrating Data Privacy Day to champion data security. “Privacy is our individual responsibilities. We cannot always expect or assume that Internet ...

Why Your Company Needs To Hack Itself
Fast Company
BY Neal Ungerleider Sun Jan 29, 2012 Computer security expert Jeremiah Grossman thinks that traditional cybersecurity doesn't have what it takes to fight off today's wired intruders; he advocates companies and governments invite hackers to find weak ...

Fast Company

Cyber Defence Summit
Help Net Security
The Cyber Defence Summit is gathering key regional stake holders in Muscat, Oman to discuss the heightened importance of cyber security throughout the entire Middle East. Under the theme 'Defending your virtual borders' the invitation-only initiative ...

Center offers security tips
Monroe News Star
The Center for Internet Security (CIS), cisecurity.org a national nonprofit focused on enhancing the cyber security readiness and response of public and private sector entities, has issued tips to help users protect themselves and their information ...

Wanted: Ethical hackers
Business Standard
At present, the number of certified security professionals in India is estimated at 22000 by Cyber Security and Anti Hacking Organisation, while another report by Nasscom says that India needs about 77000 ethical hackers every year.

Anzac joint crisis unit abandoned
The Dominion Post
New Zealand and Australia have stepped up co-operation on cyber security and counter-terrorism. But both countries appear to have abandoned a proposal to create a joint ready-response force, with Defence Minister Jonathan Coleman yesterday signalling ...

Sourcefire launches FireAMP anti-malware product
Telecompaper (subscription)
Intelligent cyber security provider Sourcefire has introduced FireAMP, a malware discovery and analysis product that analyses and blocks malware by utilising big data analytics. It is designed for large enterprises and Sourcefire says delivers the ...

MTN Satellite Communications Appoints Margaret E. Grayson as Chief Financial ...
MarketWatch (press release)
Ms. Grayson is an expert in cyber security and information sharing, and has participated in several comprehensive studies designed to provide the President, through the Secretary of Homeland Security, with guidance and recommendations on the security ...

Firewalls and firearms
McGill Daily
This expanding threat has led a number of countries to ramp up their development ofcyber-security as well as cyber-warfare tools. After alleged Hezbollah cyber-attacks, Israel rapidly transformed itself into one of the major players in cyber warfare.

McGill Daily

Media Cheat Sheet 01/30/2012
Honestreporting.com
How did Israeli cyber-security rank so highly in a study? And what to make of reports that Syria's first lady tried flee the country? • Palestinian activists tell AP that the Fatah and Hamas have created an environment of intolerance in the West Bank ...

Honestreporting.com

Dutch DigiD vulnerable to DDoS attacks - NCSC
Telecompaper (subscription)
The Dutch National Cyber Security Center (NCSC) has warned that the ICT servers of the minister of interior could be vulnerable, with DigiD open to DdoS attacks. Logius is set to upgrade thes server environment on 6 February.

Pentagon punts on major program cuts
Federal Times
Even cybersecurity funding, one of the few areas where investment will increase, will be focused on fixing vulnerabilities rather than advancing capabilities. "There will be an approach to review a lot of our cyber capabilities," Chris Coleman, ...

MacAulay-Brown Awarded $75 Million Contract by Air Force Special Operations ...
MarketWatch (press release)
For over 30 years, customers have relied on MacB to provide a broad range of technology services, solutions and management support in the areas of Cybersecurity, Information Operations/Warfare, Intelligence, Surveillance and Reconnaissance, ...

Smart metering - the next big waste of money or venerable project?
ComputerWeekly.com (blog)
Government plans to create a smart grid for energy networks will require a coordinated focus oncybersecurity as communication networks play a key role, according to a report from The Energy Networks Association (ENA). The ENA published the report for ...

More caution needed against cyber stalking
Daily Aztec
One in five Americans (19 percent) has been affected by online stalking or “aggressive outreach incidents” according to a recent study released by the National Cyber Security Alliance. Persistent emails, identity theft and harassment are all prime ...

Content, Copyright & The Internet -- The Reality
Forbes
Indeed, solid research and well balanced analyses from investors, law professors, Internet engineersand cyber security experts helped inform the outrage and direct the action by Internet users. Even those who knew nothing of SOPA and PIPA before the ...

Transcript of joint Aust/NZ PMs' press conference
Scoop.co.nz (press release)
One of the key security challenges of our age is cyber security, so a relationship as old and as deep as this one needs to be taken into the future and deal with contemporary challenges, like cyber security. We've agreed to develop a six month trial ...

Flournoy Discusses State of World as She Leaves Office
Department of Defense
Flournoy saw increased emphasis on cybersecurity and expects operations in cyberspace to become more important in the years to come. Her office gets involved because the domain is so new, and experts are puzzling over what constitutes an attack.

Department of Defense

Lockheed Martin leads expanded lobbying by US defense industry
Washington Post
Lockheed's F-35 While Lockheed Martin's defense portfolio spans missiles to cybersecurity and shipbuilding, its top program is the F-35 Joint Strike Fighter, which Congress last year scrutinized over delays and cost overruns. The F-35 is the Pentagon's ...

Inventors, Entrepreneurs, and Makers of All Things Technical and Scientific ...
MarketWatch (press release)
"The 'hackerspace' groups that have come together across the country are providing volunteer assistance to the defense industry and cyber-security industry, and they are now making an impact on assistive technology for individuals with disabilities, ...

Aoun rallies presidents to support homeland security funding
News@Northeastern
The Kostas Research Institute will build on its strength in explosives detection,cyber security, underwater robotics and national resilience. Aoun's leadership in forming this coalition aligns with Northeastern's commitment to use-inspired research...

News@Northeastern

Your Data Has Probably Already Been Stolen
MainStreet
“Many of the cyber security experts agree that the bad guys do have a lot of data,” says Mustaque Ahamad, director of the Georgia Institute of Technology's Information Security Center. “But for them to actually profit from that is a little harder than ...

For Journalists, Cyber-Security Training Slow to Take Hold ...
By Blackmere
For Journalists, Cyber-Security Training Slow to Take Hold – AllAfrica.com. Published January 30, 2012. For centuries, journalists have been willing to go to prison to protect their sources. Back in 1848, New York Herald correspondent John ...
Blackmere Consulting

New Version of HR 3674, 'the' House Cybersecurity Bill
By PJCoyle
6. Assessment of Sector by Sector Cybersecurity Preparedness. Please note that §5 provides for training fusion center personnel in IT security practices to protect their information systems, not about cyber security threat assessment. It would ...
Chemical Facility Security News

Dataquest : Top Stories : Quarantining Cyber Space for Cyber Security
Deliberate attacks on the cyber space of the government bodies has brought forth a new dimension of political rivalry and war between nations.
DataQuest

There needs to be a collective approach to ensure cyber security ...
By Conservative Home
Established by parliament in 1994, the Intelligence and Security Committee provides democratic scrutiny of the finances, policy and administration of our three intelligence agencies – MI5, MI6 and GCHQ. Only two decades ago it was ...
ConservativeHome's Parliament Page

Prison Planet.com » Big Brother Internet
By admin
Considering the apocalyptic rhetoric coming from Washington and the ranks of cybersecurity experts – echoed by media reports that portray every picayune data breach as Armageddon – it would appear that the vulnerability of the Internet has ...
Prison Planet.com

DOD public-private cybersecurity program test run expanding into ...
DOD gives DHS expanded role in cybersecurity program ... seeks to build upon the DIB Opt-In Pilot and allow DHS, through the National Cyber Security Division ...
defensesystems.com/articles/.../dib-cyber-pilot-dhs-dod.aspx

Are you guilty of cyber crime?

Are you guilty of cyber crime?
Malaysia Star
TECHNICAL glitches and Internet security issues are the top tasks for national cyber securityspecialist centre Cyber Security Malaysia. Lately, however, the reported incidents they have received are falling more in the difficult-to-define “human ...

Sourcefire unveils malware protection
Trade Arabia
Sourcefire, a leader in intelligent cybersecurity solutions, has introduced FireAMP advanced malware protection, a malware discovery and analysis solution that analyses and blocks malware by utilising big data analytics. Designed for large enterprises, ...

NZ, Australia to tighten security ties
Otago Daily Times
New Zealand will further tighten its security ties with Australia with new moves that include greater surveillance in the Pacific, talks on cyber security, and a new strategic defence framework. New Zealand will also be given a seat on Australia's ...

Cybersecurity efforts trigger privacy concerns
KVAL
29, 2011 file photo, cyber security analysts work in the "watch and warning center" during the first tour of the government's secretive cyber defense lab, in Idaho Falls, Idaho. The Homeland Security Department's Control System Security Program ...

KVAL

White House Presses For New Cybersecurity Laws
InformationWeek
Congress has dragged its feet for years on passing cybersecurity legislation, so the Obama administration is applying pressure. By Elizabeth Montalbano InformationWeek The White House is urging Congress to pass President Obama's cybersecurity ...

CyberSecurity warns against phishers on Twitter
Malaysia Star
CyberSecurity Malaysia has confirmed that this is a phishing attack. Phishers are unscrupulous people, who try to trick Internet users into revealing the details of their online accounts. In this case, clicking on the link in the tweet will take you to ...

Cybersecurity - What are the Real Privacy Concerns?
Nextgov
Ensuring that we protect privacy is important, but, at the same time, if there truly is going to be a public-private partnership to further our efforts on cybersecurity we must be careful to not overly restrict efforts to share information to evaluate ...

Legal think tank raises red flag about privacy in cybersecurity legislation
Infosecurity Magazine (US)
Former US national security officials from the Clinton, Bush, and Obama administrations are pushing the Senate for passage of comprehensive cybersecurity legislation. The House Homeland Security Committee's cybersecurity subcommittee examined ...

For journalists, cyber-security training slow to take hold
CPJ Press Freedom Online (blog)
This week, a Columbia Journalism Review blog entry looked into whether US-based journalism schools were teaching cyber-security skills. "I spoke with a number of journalism schools," wrote Alysia Santo, "and found a range of approaches.

South African ministry to send long-delayed cybersecurity policy to cabinet
Infosecurity Magazine (US)
Cath Everett looks at the current situation and at what is being done to address the issue The Government Communications Headquarters (GCHQ), which is responsible for key aspects of the UK's cybersecurity, has lost equipment worth up to £1m, ...

My day as a cyber warrior in a conference centre in Tower Hill
Wired.co.uk
By Olivia Solon The language of cyber security sounds dangerous. Firewalls. Viruses. Trojans. Warfare. So when I went along to the Cyber Security Challenge designed to test the best hackers in the land, I was expecting at least a percentage of ...

Wired.co.uk

Opinion: Data Privacy Day serves as reminder of risks companies may face in ...
The Star-Ledger - NJ.com
By Times of Trenton guest opinion column By Doug Borden According to the NationalCyber Security Alliance (NCSA), Data Privacy Day is set for today. Is a Data Privacy Day necessary? How concerned should we be about identity theft? Data security?

The Star-Ledger - NJ.com

Energy Department to establish new cyber center
FCW.com
By Camille Tuutti The Energy Department is establishing a cybersecurity center to address the various web-based threats it encounters, according to Energy CIO Michael Locatis III. Withcybersecurity presenting a complex challenge in an environment of ...

Chinese Cyber Attackers Will Target UK Businesses, Says IT Expert
PR Web (press release)
International information security expert Lieutenant Colonel (Ret'd) William Hagestad II is today warning UK businesses could fall victim to cyberattacks from China unless they improve theircybersecurity. International information security expert ...

White House cyber czar stumps for comprehensive bill
The Hill (blog)
By Gautham Nagesh - 01/27/12 11:00 AM ET White House Cybersecurity Coordinator Howard Schmidt pressed Congress to pass comprehensive cybersecurity legislation rather than tackling the issue in piecemeal fashion on Thursday.

Newsmakers 1/27: Jim Langevin
Providence Eyewitness News
Langevin said though Congress is the most divisive he's ever seen, he thinks some measures will get through, including bills to beef up the nation's cybersecurity and an extension to the payroll tax cut. Langevin also discusses the conversation he had ...

Russia Must Be Ready for Space, Cyber Wars
RIA Novosti
"As you see, warfare center has moved to aerospace and information spheres, including cyber security, from traditional war theatres on land and sea. Concepts of network-centric war have made great progress," Makarov told an Academy of Military Sciences ...

Sam Nunn, one of Georgia's most prominent veterans of the Cold War, is now ...
Columbus Ledger-Enquirer
Our primary focus was on economic trade and political relationships, but we did also talk about security, including cyber security. So it was a broad agenda. What experiences and insights, in particular from your years in the Senate and your leadership ...

Columbus Ledger-Enquirer

Lecture series kicks off Feb. 2
Lynchburg News and Advance
23: “Cybersecurity” by Lynchburg College instructor of business administration Paul Kelbaugh. Lectures are free and open to the public and will be preceded by light refreshments beginning at 2:30 pm Lectures will be cancelled and rescheduled (if ...

World Economic Forum Davos 2012: It would be foolish to restrict Internet ...
Economic Times
The issues like cyber security need to be taken seriously and we need to do a lot better on these fronts, he noted. "When we talk about free Internet and restrained Internet, the names like Arab Spring indeed come to the mind and the authoritarian ...

Daily WEF update
swissinfo.ch
Try “gauging the atmosphere” on any given day that includes debates on unemployment, bank regulation, the environment, women's rights, cyber security, Africa, Asia, Europe and the US. It's like choosing which programme to watch on Christmas Day while ...

swissinfo.ch

NZ PM seeks trans-Tasman push in Asia
Ninemsn
She also announced the establishment of an Australian-New Zealand cyber dialogue to deal with the challenge of cyber security. "We've got work to do in our region, we've got work to do in Afghanistan, work to do in formats like the East Asia Summit and ...

DRDO – DU MOU for Enhanced Academic Interaction and R&D Collaboration
VAdvert Press Center (press release)
He set the roadmap by identifying certain key areas for collaboration such as laser physics, cyber security, cryptography, nanotechnology, MEMS, and sensors for specific applications. Earlier, welcoming the gathering, Dr Bhujanga Rao, ...

'Chuck' Recap (Series Finale): Thanks for the Memory
The Faster Times
You can believe that they go back to spying, or convert Carmichael industries into a cyber-security firm, or pretty much whatever you want. On that note, even though Chuck and Sarah are allegedly out of the spy game, there may well be more adventure...

The Faster Times

Statement by Public Safety Minister Vic Toews on Data Privacy Day
NorthumberlandView.ca
That is why, in 2010, our Government launched Canada's Cyber Security Strategy, Canada's plan for meeting the cyber threat and protecting our digital infrastructure. Canada's Cyber SecurityStrategy demonstrates our commitment to keep Canadians safe in ...

WISeKey in Focus at Davos as the WEF Names Cyber-security a ...
By admin
DAVOS, Switzerland, January 26, 2012 /PRNewswire/ –. WISeKey has been named a Global Growth Company Partner of the World Economic Forum (WEF), granting the company full participation at the 2012 Annual Meeting in Davos.
OISTE

US cybersecurity labors trigger privacy concerns
By admin
The Associated Press obtained a facsimile of the article arrived advance. Cybersecurity has turn out to be a hurriedly expanding priority intended for the.
BrightEarth

CSOSN 2012 : Cybersecurity of Online Social Networks
CSOSN 2012 : Cybersecurity of Online Social Networks.
www.wikicfp.com/cfp/servlet/event.showcfp?eventid...

The State of the Union's Cybersecurity
President Obama uttered the term "cyber" only once in his 7200-word State of the Union address Wednesday night, but that fleeting moment about an hour into ...
www.healthcareinfosecurity.com/blogs.php?postID=1175

Cyber Security Issues and Solutions - Tweetmeme
Cyber Security Issues and Solutions - Emergency Management (blog) http://t.co/ PBAbBIeL #InfoSec.
tweetmeme.com/story/.../cyber-security-issues-and-solutions

SANS: Tool Talk Webcast: What is a cybersecurity-ready log ...
Cyber Security Graduate School · isc Internet Storm Center ... What is a cybersecurity-ready log management solution and how do I find one? Featuring: Varun ...
www.sans.org/.../cybersecurity-ready-log-management-solutio...

US cybersecurity efforts trigger privacy concerns

US cybersecurity efforts trigger privacy concerns
Fox News
Cybersecurity has become a rapidly expanding priority for the government as federal agencies, private companies and everyday people come under persistent and increasingly sophisticated computer attacks. The threat is diverse, ranging from computer ...

Fox News

US cybersecurity efforts trigger privacy concerns
Newsday
Click here US cybersecurity efforts trigger privacy concerns Published: January 27, 2012 10:33 AM By The Associated Press LOLITA C. BALDOR (Associated Press) (AP) -- The federal government's plan to expand computer security protections into critical ...

Verizon and National Cyber Security Alliance, in Recognition of Data Privacy ...
MarketWatch (press release)
28), is being led by the National Cyber Security Alliance, a nonprofit organization dedicated to empowering a companies and individuals to use the Internet safely and securely. During Data Privacy Day, now in its fifth consecutive year, ...

Haste makes waste: Energy Department's smart grid review leaves cybersecurity ...
Infosecurity Magazine (US)
The IG attributed the shortcoming in the cybersecurity plan review to the DOE's accelerated planning, development, and deployment approach for the Smart Grid Investment Grant (SGIG) program. “Officials approved cyber security plans for Smart Grid ...

Summary Box: US Cybersecurity Triggers Concerns
ABC News
THE WORRIES: The federal government's plan to expand computer security protections into critical parts of private industry is raising concerns that the move will threaten Americans' civil liberties. SPECIFICS: A new report warns that as the Obama ...

Cyber security policy in March
ITWeb
The Department of Communications (DOC) will present the National Cyber SecurityPolicy Framework for SA to Cabinet in March. “Cyber crime threats are global curses of advances in technology. This means that our electronic communications networks must ...

ITWeb

Technical controls not enough to ensure real cyber security
Infosecurity Magazine (US)
The European Commission has launched the first EU Internal Security Strategy, which includes proposals to increase cybersecurity and fight cybercrime. A new report from the Information Security Forum (ISF) proposes the evolution from simple data ...

RBI to act against banks not beefing up cyber security
Times of India
CHENNAI: The Reserve Bank of India (RBI) will act against banks that do not implement its guidelines on electronic security of their transactions and operations by October 2012, a senior official said Friday. A working group, under the chairmanship of ...

A Cybersecurity State of the Union
IT Business Edge (blog)
I would have watched no matter what because I always do, but this year, I was interested to hear if the president would mention cybersecurity in his speech. After all, the topic has been generating a lot of interest in Washington and that includes ...

AFCEA West 2012: Action urged over cyber security
Shephard Media
An industry expert has emphasised the importance of a universal sense of responsibility when it comes to enhancing cyber security. Speaking to Shephard during the AFCEA West conference in San Diego, US on 26 January, Bob Noonan, senior vice president ...

Session teaches school kids how to ensure cyber security when online
Gulf Today
To achieve cyber security in the telecommunications sector, we are required to spread awareness on this topic to this particular user base. “This enables us to establish an intact structure of users equipped with knowledge necessary to protect ...

Hackers steal source code from Symantec – cyber security again highlighted by ...
Live Insurance News
Acclaimed Internet security company Symantec has announced that the source code for its popular pcAnywhere program has been stolen by hackers. The company has issued a warning encouraging consumers to discontinue use of all Norton Antivirus, ...

Live Insurance News

Paet, Indonesian Defense Minister Discuss Cyber Security
ERR News
The two spoke about cyber security and cyber protection as well as opportunities for Estonian companies to participate in Indonesia's defense-related procurements, a statement from Paet's ministry said. The battle against high seas piracy was also on ...

FTC head calls out Facebook, Google on Data Privacy Day
msnbc.com
By Helen AS Popkin Federal Trade Commissioner Julie Brill didn't spare Facebook in her speech opening a forum on Data Privacy Day — even though the event was live-streamed by the social network, in conjunction with the National Cyber Security Counsel.

Want 'CSI' without the blood? Investigate computer forensics
Daily Comet
But the profession may be worth exploring as a real-life career since it's expected to grow by double digits with the increasing demand for cybersecurity from public and private entities. Steve Bunting, who has been involved in computer forensics for ...

Cyber Roundup: Companies Open Offices Near Fort Meade
Patch.com
Government Security News reported on leadership changes in the cybersecurity arm of the Department of Homeland Security. Rear Adm. Mike Brown retired from his position as the deputy assistant secretary for cyber security and communications.

Maryland MESA Students Discover the Importance of STEM Education at Capitol
Citybizlist (press release)
"Once again the students had the opportunity to learn more about cyber security, the use of robots and how satellites are managed," Paula Shelton, executive director of Maryland MESA, said. "They were excited and engaged. The Capitol College staff and ...

eBay GSI Executive Says Privacy, Security Not Incompatible
Auctionbytes
The advanced monitoring and threat detection systems that are the hallmarks of tightercybersecurity, by necessity, require certain compromises on personal privacy, the argument goes. But it doesn't have to be that way, according to Rick Buck, ...

Auctionbytes

Robotics Club Advances to Round 3 in National CyberPatriots Competition
Patch.com
The PHS club is ranked 10th in the nation for their skills in cyber security. By Annie Lane Students competing in CyberPatriots study at school. Peter Chagnon In today's world of easy access to PCs, iPads and other digital devices, computer experts ...

FTC Commissioner Blasts Facebook, Google Over Privacy Violations
TPM
Federal Trade Commissioner Julie Brill publicly blasted Google and Facebook for violating user privacy during her talk Tuesday morning at a cybersecurity forum in Washington DC, saying the companies “learned it the hard way” from the FTC that they...

TPM

Cyber defence an immature discipline
ITWeb
By Nadine Arendse Hacking offers a high return on investment, and no organisation or individual is immune, says cyber security expert. Cyber defence is still an immature discipline; traditional law enforcement currently does not have the skills ...

ITWeb

Maryland's office space market shows signs of renewed life for 2012
Gazette.Net: Maryland Community News Online
Developers have spent the past few years building millions of square feet of space in that area, in response to the Pentagon's base realignment and closure program and its increasing emphasis oncybersecurity, and spy technology and weaponry.

Lumension Recognizes National Data Privacy Day With Employee Education Event
PR Web (press release)
National Data Privacy Day is the perfect opportunity for us to further raise awareness of the state ofcyber security today. In support of National Data Privacy Day on January 28, Lumension®, a global leader in endpoint management and security, ...

Developments to EtherNet/IP
Design World Network
The organization has introduced a guidelines document, Securing EtherNet/IP™ Networks, that discusses cyber-security recommendations for automation networks, including how to determine and deploy security strategies for various network types.

5 technologies on the way out in 2012
GCN.com
By GCN Staff The technology landscape is changing, with government moving increasingly toward new-school technologies, such as mobile and cloud computing, while cybersecurity concerns rise and budgets shrink. In the process, some technologies and ...

EU 24-Hour Data Breach Notification Rule 'Unworkable': ATandT Executive
eWeek
26 on the panel that was part of the National Cyber Security Alliance's Data Privacy Day event. The European Commission on Jan. 25 introduced new rules to update the 17-year-old data privacy laws to better protect Internet users.

6 security companies to watch
Network World
By Tim Greene, Network World This group of security companies includes several that want to capitalize on technology ideas that were originally devised to serve communities of special interest but could now take on a wider cybersecurity role.

WISeKey Hosts the Davos Swiss Night at the World Economic Forum in Cooperation ...
MarketWatch (press release)
The Swiss Digital Security Task Force (SDSTF) will engage organizations to cooperate in and contribute to the development, dissemination, and implementation of advancements related to cyber-security and its practice, designed to improve the current ...

Cyber Warfare: The War America is Losing
PolicyMic
And this week, cyber security firms discovered a computer virus that is using service members' network security cards to hack into government networks. Yes, America is embroiled in a virtual war, and unfortunately, we are not winning.

PolicyMic

Nuclear power simultor delivered to the Center for Advanced Engineering and ...
Power Engineering Magazine
The Advanced Configurable Main Control Room Simulator (ACMCRS) will be used for human-machine interface (HMI) and human factors (HF) studies, investigation of digital instrumentation and control systems for nuclear power plants, and cyber security ...

The Constitution Project: U.S. Cybersecurity Efforts Trigger Privacy ...
By The Huffington Post News Editors
WASHINGTON -- The federal government's plan to expand computer security protections into critical parts of private industry is raising concerns that the move will threaten Americans' civil liberties. In a report for release Friday, The Constitution ...
The Huffington Post | Full News Feed

US cybersecurity efforts trigger privacy concerns | The Associated ...
By The Associated Press
Privacy advocates are warning that the government's plans to expand computer security protections into critical parts of private industry could threaten Americans' civil liberties.
Examiner RSS

Verizon and National Cyber Security Alliance, in Recognition of ...
By Blackmere
Verizon and National Cyber Security Alliance, in Recognition of Data Privacy Day, Urge Consumers, Businesses to Protect Their Data – TMCnet. Published January 27, 2012. NEW YORK, Jan. 27, 2012 /PRNewswire via COMTEX/ -- In ...
Blackmere Consulting

As the Federal Government Moves to Increase Cyber Security ...
By jacob
The federal government's plan to expand computer security protections into critical parts of private industry is raising concerns that the move will threaten Americans' civil liberties. Read more at Newsday/AP. Tagged with: cyber security ...
SecureWorld Post

Verizon and National Cyber Security Alliance, in Recognition of ...
Verizon and National Cyber Security Alliance, in Recognition of Data Privacy Day, Urge Consumers, Businesses to Protect Their Data.
ITbriefing.net

WISeKey in Focus at Davos as the WEF Names Cyber-security a ...
By Admin
DAVOS, Switzerland, Jan. 27, 2012 /PRNewswire-Asia/ -- WISeKey has been named a Global Growth Company Partner of the World Economic Forum (WEF),
Biz Daily

Do Security Maturity Models Work? | NovaInfosecPortal.com
By judykavuo
The “Electric Sector Cybersecurity Risk Management Maturity” project, a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS), will leverage the insight of private industry and public sector experts to build on existing cybersecuritymeasures and strategies to create a more comprehensive and consistent approach to ... Best Approach to Increase Cyber Security Professionals · Job: Security Engineer II in Fairfax, VA ...
NovaInfosecPortal.com

US cybersecurity efforts trigger privacy concerns - Breitbart
Cybersecurity has become a rapidly expanding priority for the government as federal agencies, private companies and everyday people come under persistent ...
www.breitbart.com/article.php?id=D9SH7CH02&show...1

Smartphone Cyber Security Training Module Released by Wombat ...
Pittsburgh, PA – January 18, 2012 –Wombat Security Technologies (Wombat), a leading provider ofcyber security training solutions, has announced the release ...
www.wombatsecurity.com/smartphone-cyber-security-training...

Outsource your cybersecurity to protect your company without ...
As cybersecurity threats increase, you might want to outsource your security needs, Riva Richmond writes. This approach allows you to make use of security ...
www.smartbrief.com/servlet/rdrc?u...7D52...i...

Intelligent Cybersecurity Solutions | Sourcefire Cybersecurity
Sourcefire is 100% dedicated to cybersecurity technologies. Trusted for more than a decade, Sourcefire epitomizes security innovation, intelligence and agile ...
www.sourcefire.com/security-technologies/agile-security

Chief Scientist Cyber Security Research - AfterCollege
entry level jobs and internships chief scientist cyber security research.
www.aftercollege.com/company/pacific.../44074662/

Proactive Cyber-Security Needed, Ex-Spy Says
U.S. cyber-security will not shield businesses unless a crisis forces change, ... Guardians of the Grid: Agencies Unite to Bulk Up Utility Cybersecurity · Learn ...
ctolabs.com/.../proactive-cyber-security-needed-ex-spy-says/

National Cyber Security Alliance (NCSA) Officially Celebrates Data Privacy Day

National Cyber Security Alliance (NCSA) Officially Celebrates Data Privacy Day ...
Sacramento Bee
By National Cyber Security Alliance WASHINGTON, Jan. 26, 2012 -- /PRNewswire/ -- The NationalCyber Security Alliance (NCSA), a non-profit public-private partnership focused on cybersecurityawareness and education for all digital citizens and official ...

Pike Pulse Report: Smart Grid Cyber Security Threat Management
MarketWatch (press release)
26, 2012 /PRNewswire via COMTEX/ -- Reportlinker.com announces that a new market research report is available in its catalogue: Smart grid cyber security remains a nascent market. The competitive landscape has established smart grid specialists, ...

Senators back Obama's call for cybersecurity reform
The Hill (blog)
"As Chairman of the Senate Commerce Committee, I fully support efforts to protect our national security by passing cyber security legislation. I have been working for years to address our country's vulnerability to cyber-attacks and believe now is the ...

Shred-it and National Cyber Security Alliance Call on Organizations to Protect ...
MarketWatch (press release)
Shred-it and The National Cyber Security Alliance have joined forces to promote International Data Privacy Day to educate organizations on how they can protect the privacy of information. With support from a wide array of companies, nonprofits, ...

WISeKey in Focus at Davos as the WEF Names Cyber-security a Top Global Risk
MarketWatch (press release)
WISeKey is recognized as a role model for innovative cyber-security technology and efforts to protect individuals, businesses, and governments on the Internet. The WEF ranks cyber-attacks as one of the top five risks in the world.

Why cyber security represents a new cold war
SC Magazine UK
The nuclear standoff of the 60s may be behind us, but a new cold war, or rather code war, has started to grip the globe. Cyber espionage is real and present danger for every form of organisation. Only recently, Foreign Secretary William Hague said ...

SC Magazine UK

Information Security Forum launches Cyber Security Strategies report to help ...
SourceWire (press release)
The report, Cyber Security Strategies: Achieving cyber resilience addresses the 'risk vs reward' aspects of cyberspace and identifies the key capabilities that organisations need to adopt to increase their resilience to threats.

Smart Grid grantees' cybersecurity plans lacked elements, says IG
FierceGovernmentIT
The grant program, the report adds, therefore offered a unique opportunity to promote strongcybersecurity in the electricity sector. "We also believe that the department should take steps to ensure the submitted cyber security plans are complete, ...

Cyber crime: A threat Kenya must not ignore
Business Daily Africa
Photo | Emma Nzioka By RAWLINGS OTINI, rotini@ke.nationmedia.com (email the author) Cyber security infrastructure preparedness involves up-to-date software and requisite laws. Various strategies involving different stakeholders are already in place.

Business Daily Africa

Four Recognized Experts Selected to Keynote SEPG North America 2012
MarketWatch (press release)
... acting assistant secretary of the Office of Cybersecurity and Communications (CS&C), where she plays a leading role in developing the strategic direction for all of CS&C and its components, consisting of the National Cyber Security Division (NCSD), ...

DHS denies rail attack despite detailed TSA memo
Examiner.com
"Railroads closely monitor cyber security as a fully integrated part of both the industry's overall security plan, as well as individual company plans. Continuous coordination on cyber securityoccurs across the industry and with the federal government ...

FTC site still down after Anonymous hack; anti-piracy fallout spreads
GCN.com
By Kevin McCaney The Federal Trade Commission's cybersecurity advice website remained offline Jan. 25, a day after it had been hacked by the group Anonymous in a continuing protest over proposed anti-piracy laws and recent anti-piracy arrests.

"Great Decisions," advice for cyber security
KYTX
By Amanda Roberson - email EAST TEXAS (KYTX) -- More than 80 East Texans were all ears as two UT Tyler computer science professors explained the basics we all need to remember -- about what happens in the cyber world and why many computer users are at ...

Chinese Cyber Attackers Will Target UK Businesses, Says IT Expert
SourceWire (press release)
London, 26 January 2012: International information security expert Lieutenant Colonel (Ret'd) William Hagestad II is today warning UK businesses could fall victim to cyberattacks from China unless they improve their cybersecurity.

Center for Internet Security Recognizes Data Privacy Day on January 28
DigitalJournal.com (press release)
In support of Data Privacy Day, the Center for Internet Security (CIS), a national not-for-profit focused on enhancing the cyber security readiness and response of public and private sector entities, today issued tips to help users protect themselves ...

How to protect your company's data
Bizjournals.com
In fact, 85 percent of business owners believe their company is safe from hackers, viruses, malware or a cyber-security breach, according to a September 2011 survey of over 1000 US small businesses sponsored by Symantec Corp. and the National Cyber ...

Delaware Valley grad contributes to Obama speech
Pocono Record
Finan is the director for cybersecurity legislation on the national security staff at the White House. He works on a team under John Brennan, the president's chief counterterrorism adviser, and Howard Schmidt, US cybersecurity coordinator.

Symantec 3Q narrowly tops Street; outlook dim
CBS News
Cybersecurity company Symantec Corp. said Wednesday that its third-quarter net income jumped 82 percent as revenue grew steadily while restructuring costs and interest expenses fell. Net income in the three months ending Dec. 30 rose to $240 million, ...

Today January 26th: Facebook to Live Stream Official International Data ...
Security Park
The National Cyber Security Alliance (NCSA), a US based non-profit organization and official coordinator of Data Privacy Day, yesterday announced that it will celebrate Data Privacy Day 2012 by hosting "The Intersection of Privacy & Security", ...

Sourcefire Uses Big Data Analytics To Stop Malware
NetworkComputing.com
Cyber security vendor Sourcefire's latest product uses big data analytics methods to search data to discover patterns in malware attacks and intervene to stop them. The release of FireAMP comes the same week that Cisco Systems released its 4Q11 Global ...

Davos 2012: Alarming growth in cyber-attacks
Telegraph.co.uk
PwC says cyber security was often seen as a technology issue and not dealt with at the appropriate level in the business. Photo: ALAMY By Kamal Ahmed, Sunday Telegraph Business Editor, Davos Ian Powell, UK chairman and senior partner of PwC,...

Telegraph.co.uk

Raytheon profit rises 18% on lower costs
MarketWatch
Raytheon and other defense companies have been diversifying into growing areas such as cybersecurity and seeking international growth in response to lean US defense spending. Raytheon in November won approval from the US Congress and the State ...

Jobseekers Networking Seminar
Southern Maryland Online
Time will be provided to network with the speaker and other jobseekers. 1/27/2012 Mike Covert of Assevero, Cyber Security Professionals. “Current Cyber Security Opportunities” Assevero wants you to know how they hope to find and develop candidates.

House Homeland Security lawmakers request sole oversight of DHS
Nextgov
On the subject of cybersecurity alone, Congress since April 2011 has brought in DHS officials for roughly 10 hearings, including sessions at the House committees on Homeland Security, Energy and Commerce, Financial Services, Judiciary and Oversight and ...

ANSI 17024 Accreditation performed for first time outside USA.
ThomasNet Industrial News Room (press release)
EC-Council is committed to cybersecurity and currently seeking ANSI accreditation of its Certified Ethical Hacker (CEH v8) certification program. This recognition is important because many US federal agencies and private organizations use this ...

PaRaBaL Requested to Speak at ISSA's International Conference
PR Web (press release)
PaRaBaL Inc. a leading cyber security training and assessment company specializing in Apple iOS mobile device security (iPad and iPhone), was requested to speak on mobile computing security in the workforce at ISSA's International Conference located in ...

ISF: consider a cyber resiliency response to protect against 'unknown unknowns'
SC Magazine UK
At a presentation this week, Michael de Crespigny, CEO of the Information Security Forum (ISF), said that cyber security is not an information security issue, but a business issue. He claimed that cyber space is increasing the information security risk ...

O2 phone numbers leak just the start?
T3
In response to the O2 phone numbers leak a number of privacy and cyber security experts have come together to warn customers that this is not the last time their phones will be under threat. Speaking at a forum which was held yesterday Stuart Coulsen, ...

National Cyber Security Alliance (NCSA) Officially Celebrates Data ...
By Blackmere
26, 2012 /PRNewswire/ -- The National Cyber Security Alliance (NCSA), a non-profit public-private partnership focused on cybersecurity awareness and education for all digital citizens and official coordinator of Data Privacy ... Read More ...
Blackmere Consulting

Bankers to discuss cyber security
By ians
Chennai, Jan 26 (IANS) Bankers and cyber experts will meet here Friday to discuss securing electronic banking transactions and improving customer convenience,
Hamara News

PwC: Cyber Security Experts Hope To Shock Global Business ...
By Rob Starr, Big4.com
In Global Risks 2012, PwC illustrated just what a cyber attack means for businesses in a mocked up boardroom scenario session recently at Davos.
Big4.com

President Obama Thinks U.S. Cyber Security Should Be ...
By jacob
echoed President Obama's call in the State of the Union for Congress to pass comprehensivecybersecurity legislation.. Read more at The Hill. Tagged with: cyber defense • cyber security • national security • policy. If you enjoyed this article, ...
SecureWorld Post

Remarks of Federal Trade Commissioner Julie Brill at the National ...
Remarks of Federal Trade Commissioner Julie Brill at the National Cyber Security Alliance Data #Privacy Day January 26, 2012 · Edit · Delete · Tags · Autopost. Click here to download: 120126datarivacyday.pdf (158 KB). (download) ...
PrivacyCamp

Dealing with 2012's security hot potato « BT Viewpoint. Business ...
By DanielBooth
It's down to Chief Security Officers (CSO) to come up with a solution; to stop the constant game of catch-up and adding cyber security controls only after a problem has highlighted the lack of cyber security protocols. Guest blogger and Head of ...
BT Viewpoint. Business insight,...

Estonia and Indonesia Consider Fight against Piracy and Cyber ...
In a meeting in Jakarta with Indonesian Minister of Defence Purnomo Yusgiantoro, Foreign Minister Urmas Paet talked about cyber security and cyber protection as well as opportunities for Estonian companies to participate in Indonesia's ...
Estonian Embassy in Russia :: News

DHS denies rail attack despite detailed TSA memo - Grendel Report
"Railroads closely monitor cyber security as a fully integrated part of both the ... Continuous coordination on cyber security occurs across the industry and with the ... November received a great deal of media attention when a cyber security ...
Grendel Report

Chinese cyber attackers will target UK businesses, says IT expert
London, 26 January 2012 - International information security expert Lieutenant Colonel (Ret'd) William Hagestad II is today warning UK businesses could fall victim to cyberattacks from China unless they improve their cybersecurity. Speaking ...
IT Governance - Latest News

Chemical Facility Security News: Reader Email – Expected Alerts ...
By PJCoyle
If an energetic cybersecurity manager knew which systems came with default passwords and knew what they were, it would be a relatively easy (okay so that is a slight exaggeration, and our receptionist is just slightly pregnant) to go back and ...
Chemical Facility Security News

Homeland Security Today: Cybersecurity Receives Emphasis in ...
President Barack Obama called for cybersecurity legislation to provide incentives to businesses to protect their information systems from attacks or intrusions in ...
www.hstoday.us/.../006d2400b6d29066d70b22a85723b0c0.h...

SEC Guidance on Disclosing Cybersecurity Risks
This proliferation of cyber attacks led to … interpretive guidance on the disclosure of cybersecurityrisks by public companies [from] the SEC's Division of ...
corporatelaw.jdsupra.com/.../sec-guidance-on-disclosing-cyber...

IntelliDyne, LLC - Information Assurance / Cyber Security
Your enterprise security environment faces visible and invisible internal and external threats. Some risks are related to users, some relate to business processes ...
www.intellidyne-llc.com/.../Information-Assurance-Cyber-Sec...

Technical Cyber Security Alert 2012-24A ≈ Packet Storm
Technical Cyber Security Alert 2012-24A - US-CERT has received information from multiple sources about coordinated distributed denial-of-service (DDoS) ...
packetstormsecurity.org/files/109075/TA12-024A.txt

State's Streufert to Lead DHS National Cybersecurity Division ...
“John comes to DHS with a broad range of experience in cybersecurity and innovation,” DHS Deputy Undersecretary for Cybersecurity Mark Weatherford, ...
fedscoop.com/states-streufert-to-lead-dhs-national-cybersecurit...

Cybersecurity for Cyber-Physical Systems
This page provides information for the Cybersecurity for Cyber-Physical ... will host a two-day workshop about the cyber security needed for cyber-physical ...
www.nist.gov/itl/csd/cyberphysical-workshop.cfm

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com