10 Security Trends To Watch In 2012

10 Security Trends To Watch In 2012
InformationWeek
"We frequently see organizations with protective measures based on the assumption that they are not a target," said Alan Brill, senior managing director of the cyber security and information assurance division at Kroll, in a recent report. ...

DHS cyber security operations see leadership changes
Government Security News
In a blog post, DHS Deputy Secretary Jane Holl Lute thanked Rear Admiral Mike Brown for his service as the deputy assistant secretary, Cyber Security and Communications. In a following post, Deputy Under Secretary for Cybersecurity, Mark Weatherford ...

Guidance Software Unveils CAT Program to Transform Channel Partners into ...
MarketWatch (press release)
EnCase Cybersecurity is critical to companies in reducing the risks, costs, and time associated with incident response through automated, real-time forensic response and security event validation. Keeping abreast of cutting edge cybersecurity ...

SMI Group Reports on European Smart Grid Cyber Security Forum
Utility Products
SMI Group announced the 2nd Annual European Smart Grid Cyber Security Forum will be held March 12th and 13th 2012 in London. Last March, the Group reported that attendees gathered for an in depth discussion on the current and future landscape for Smart ...

Will ISO 27001 Become The UK Government's Standard For Cyber Security?
The Open Press (press release)
Francis Maude, Minister for the Cabinet Office, has recently announced the UK's Cyber Securitystrategy but will the ISO 27001 feature in his plans? UK's new cyber security strategy has £650m backing behind it and will include a cybercrime unit in the ...

Police to set up Cyber Security Centre
RTHK
The police are setting up a Cyber Security Centre to combat the rising number of cybercrimes. This comes as they reported a 34 percent jump in the number of such crimes last year compared to the previous year, involving 150 million dollars. ...

Merlin International Named First Platinum Partner for cybertap
MarketWatch (press release)
"Merlin was an obvious choice when looking at their company structure, whom they provide IT solutions to, and their vast knowledge of cyber security solutions within the federal government," said Monty Deel, president of cybertap. ...

Consumers urged to be vigilant in wake of Zappos cyberattack
Indiana University
BLOOMINGTON, Ind. -- As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised in a massive cyberattack, an Indiana University cybersecurity expert is warning those affected to ...

New cyber security threats in 2012
My Fox Boston
Rob Fitzgerald, president of the Lorenzi Group, stopped by the FOX 25 Morning News with more about some of the growing trends in cyber security and how we can protect ourselves. cyber_security_threats_20120116 . mxf.

My Fox Boston

Zappos.com hacked, millions have personal info compromised
Fox 31 KDVR.com
DENVER -- A Denver-area cyber security expert urged online shoppers to use different passwords for each site they visit. That advice came after millions of customers ofZappos.comwere informed Sunday that hackers may have illegally accessed their ...

Facebook Koobface worm 'hacker gang named'
BBC News
The suspected gang were tracked down to St Petersburg after an investigation by Facebook and cybersecurity researchers. The worm gave the gang control of hundreds of thousands of computers. While not the largest such network of hijacked machines or...

BBC News

US Rep outlines online security bill
The Stanford Daily
The event, titled “Leveraging Private Sector Drive and Innovation to Improve US Cybersecurity,” was organized by Stanford's Center for International Security and Cooperation (CISAC). In addition to Rogers and Otellini, members of the panel included ...

AiNET Extends Platinum Sponsorship of Leading Information Security ...
PR Web (press release)
He continued, “Our continued sponsorship of the elite Shmoo Group helps enable this world-leading organization to continue its ground breaking cyber security leadership, education and outreach.” AiNET's expertise in secure operations extends to ...

UpTech to Drive Growth in Northern Kentucky by Fueling 50 Startup Companies
MarketWatch (press release)
Applied research areas include Health Informatics and Consumer Health Innovation; Cyber Securityand Assurance; Media Informatics and Data Visualization; Cloud Computing and Virtualization; and Business Intelligence.

Advanced Malware Analysis Tools Utilized by Federal Defense, Law Enforcement ...
MarketWatch (press release)
... Technology Group (ATG) today announced the latest in a series of enhancements to GFI SandBox(TM) (formerly CWSandBox) that are making dynamic malware analysis more accessible tocyber-security professionals defending enterprises of all sizes. ...

The Circuit: White House weighs in on SOPA/PIPA, Zappos breached, Vivek Kundra ...
Washington Post (blog)
In the statement, the White House said the proposals to block domain names had serious implications for cybersecurity and that the bill has several other issues that need to be worked out after a conversation with all stakeholders. ...

HMRC misses deadline to create team of cyber investigators
Computing
"Policies for the recruitment and retention of specialist staff are the responsibility of individual departments; however, under the National Cyber Security Programme, the government will support individual departments and agencies in developing cyber ...

Computing

Anti-terror certificate spam targets unsuspecting netizens
Deccan Herald
The fraudulent mails have been sent to the inboxes of various business entities and email users in the recent past after which Indian cyber security analysts have alerted them to avoid such mails which may compromise their personal data. ...

Network Security: Japan's Samurai Counter-Virus
Infoboom
Japan is developing a defensive cybersecurity virus that tracks down attacks to their source. It can follow a chain of "springboard" computers, disabling the attack software as it goes as well as sending back intelligence information. ...

Ability of G20 Nations to withstand cyber attacks benchmarked
Continuity Central (press release)
The index also found that several major economies — Argentina, Indonesia, Russia and Saudi Arabia — do not have cyber security plans and do not appear to be developing them. The Cyber Power Index, developed by the Economist Intelligence Unit and ...

Sheriff Said He Warned Of Hacking Risk
NewsChannel5.com
That's the word from Sheriff Robert Arnold who said he warned of a cyber security problem months ago, but nothing was done to correct it. The international group known as the Turkish Hackers recently invaded a web site for the Sheriff's Department ...

CSC Wins $45 Million Task Order to Provide Hosting and Consulting Services for GSA
MarketWatch (press release)
"By applying our expertise in cybersecurity, we will ensure our solutions for GSA represent the best practices to manage risk and provide for effective resiliency." Under the terms of the task order, CSC will host the current infrastructure that is ...

Talk looks at US students from global perspective
KNPR
January 17: "US Student Achievement From A Global Perspective" Tom Loveless Senior Fellow, Governance Studies. January 31: "The Economics of Cybersecurity: A National Dilemma" Allan A. Friedman, Fellow and Governance Studies Research Director, ...

Cyber Attacks in Canada Are on the Rise. How's How to Protect Yourself and ...
Techvibes (blog)
In 2010, Canada ranked 6th as the world's most common target for cyber related crimes and cyber security threats. Canada has also experienced a 53% increase in hacking related crimes in the past year alone. Cyber security can be defined as follows: ...

A practical guide to implementing SEC guidance on disclosure of cybersecurity ...
Lexology (registration)
Recent, high-profile cyber attacks and cybersecurity lapses have resulted in a serious focus oncybersecurity from the Obama administration, the Senate and the SEC. In the past year, there were reports of cyber thieves hacking corporate networks to ...

Edward H. Deets, III, Former Commander of Naval Network Warfare Command, Joins ...
Sacramento Bee
Ned brings not only his leadership and experience, but also a unique understanding of the cyber security challenges confronting the Department of Defense." Deets joins the SEI after retiring from more than 30 years in the Navy. ...

No 'supranational regulatory body' should govern the Internet, say US officials
FierceGovernmentIT
"Also, in an effort to establish the ITU as an operational authority on international cybersecurity, some more authoritarian countries have proposed to include cybersecurity and cyber crime provisions into the ITRs" Strickling added. ...

NSA developing cyber guidelines
FederalNewsRadio.com
The agency has not said whether contractors would have to follow the guidelines too, or just be asked to do so. The document is based on a list of 20 cybersecurity controls developed by an independent panel, according to the Times.

The Fight For Internet Censorship
Watching the Watchers.org
They threaten to badly weaken cybersecurity, an area that is purportedly a national priority (and has been for 15 years). They claim to address a major threat to IP rightsholders despite the complete lack of data that the threat is anything other than ...

US Spending on Cybersecurity, Space Systems May Ease Defense Contractors' Pain ...
Space News
Major US defense contractors like Northrop Grumman and Lockheed Martin may find some relief from shrinking Pentagon budgets in the form of increased spending on cybersecurity and space-based systems, The Washington Post reports. ...

Cybersecurity: What makes a strong password [infographic] - Holy ...
Cybersecurity: What makes a strong password [infographic]. Posted Jan 16th, 2012 at 7:00 PM and seen. times. Tweet. Via Killer Infographics. Like infographics? So do we. Kate Rinsema. Comments (0). Leave a comment... Follow this Space ...
Holy Kaw!

Guidance Software Unveils CAT Program to Transform Channel ...
Guidance Software Unveils CAT Program to Transform Channel Partners into Cybersecurity Experts.... Guidance Software Unveils CAT Program to Transform Channel Partners into CybersecurityExperts - on ITbriefing. ...
ITbriefing.net

SMI Group Reports on European Smart Grid Cyber Security Forum ...
By Blackmere
SMI Group announced the 2nd Annual European Smart Grid Cyber Security Forum will be held March 12th and 13th 2012 in London. Last March, the Group reported that attendees gathered for an in depth discussion on the current and future ...
Blackmere Consulting

Cyber Security Awareness: Embedded Hardware Dangers
By Lee
For example, let's take an attack that we know has been happening for a long time now. It is an attack on the USB devices that we use. Most of these types of USB devices come from overseas. It is hard to tell what is safe and what is not when ...
Security FAQs

NSA crafting cyber guidelines - FederalTimes.com
By ZACHARY FRYER-BIGGS
The National Security Agency is developing cybersecurity guidelines to apply to its own systems and ultimately to any government or contractor network, according to sources familiar with the effort. A 38-member team is drawing up the guidelines, which will be based ... State's effort was headed by John Streufert, who will take over duties as the new director of the National Cyber Security Division at DHS this month. But many of the ideas listed in the critical controls document have yet ...
Federal Times

Cyber Security Startup AlienVault Nabs Seven Senior HP Security ...
In other words, the company develops advanced cyber security products that unifies management of critical security systems and processes across the network, ...
techcrunch.com/.../cyber-security-startup-alienvault-nabs-seve...

InfraGard Launches SMB 'State of Cyber Security' Study
InfraGard Launches SMB 'State of Cyber Security' Study Well-publicized breaches have clearly demonstrated that no business or government agency is immune ...
infosecisland.com/.../19317-InfraGard-Launches-SMB-State-o...

New cyber security threats in 2012 on
The new year brings new threats to our computers and other electronic devices – threats that both businesses and individuals need to be aware of.
topics.myfoxboston.com/.../new-cyber-security-threats-in-201...

My Concerns with CyberSecurity Legislation – no teeth, paper audits ...
The biggest issue I have with the CyberSecurity legislation that's being put forth in Congress these days is three-fold: It has no teeth. It is just more policy with no ...
blog.securityinnovation.com/.../my-concerns-with-cybersecuri...

Cybersecurity Institute | Seidenberg School of Computer Science ...
Establishing the Cybersecurity Institute at Pace University's Seidenberg School addresses the ever-increasing demands of our society for secured information ...
www.pace.edu/seidenberg/current.../cybersecurity-institute

GSA now requiring cybersecurity plans from IT contractors
As of Jan. 6 all prime- and sub- contractors providing the General Services Administration with information technology supplies, services or systems are r.
ctolabs.com/.../gsa-now-requiring-cybersecurity-plans-from-it-...

Cybersecurity help exists, if you know where to look - Techworld.com
There are a ton of groups out there that offer cybersecurity help and guidance. The trick, it seems, is finding the...
features.techworld.com/.../cybersecurity-help-exists-if-you-kn...

New Cybersecurity Disclosure Obligations for SEC Filings | Gunster ...
Risks of Cyber Attacks If you are an executive for a public company, new SEC guidance requires you to consider cybersecurity in your ongoing periodic.
www.gunster.com/.../new-cybersecurity-disclosure-obligations...

BSA Details Cybersecurity Priorities In Letter To Senate - Dark ...
Washington — January 12 — In a letter to the 100 members of the US Senate, the Business Software Alliance today recommended six key focus areas for ...
www.darkreading.com/.../bsa-details-cybersecurity-priorities-i...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com