2012 Cybersecurity Trends to Watch in Government

2012 Cybersecurity Trends to Watch in Government
Government Technology (blog)
It's that time of year when we ask: where are we heading in regards to cybersecurity in 2012? Also, where have we been? Here's a bit of what I've been reading over the past week. In my opinion, most of these lists are fairly predictable, ...

Infosec & AntiSec Trends in 2011 Usher in Cybersecurity and Cyberwar
Z6Mag
A new year of New Year's Resolutions and a progressively faster march down into an insecure world which is even more important these days in the cyber world. Infosec & AntiSec movements have had a crazy year in trends in 2011. With talk of cyber war, ...

Z6Mag

PJM CEO speaks out on cyber security and resilience
Smart Grid News
By Andy Bochman In an interview published a couple of weeks before Christmas, Linda Evers of the excellent Smart Grid Legal News blog conducted a brief Q&A with PJM CEO Terry Boston and got quickly to the subject of grid cyber security. ...

Smart Grid News

Start 2012 with Better Cybersecurity Focus
IT Business Edge (blog)
The Anonymous attack stories are getting old, and I have to wonder at what point organizations will do a better job of cybersecurity. But then, word is that Stratfor didn't even bother to encrypt the stolen information. If a security company allegedly ...

Make cyber security key to your business in 2012
Aviva Risk Management Solutions
As innovations in technology continue to move the business world further forward and more and more staff access work data on the move, the threat to cyber securityincreases. It is not just the physical assets a company owns which have a value, ...

Aviva Risk Management Solutions

New Cyberstrategy Highlights UK Weaknesses
Internet Evolution
Last month saw the publication of the UK Cyber Security Strategy, outlining the UK government's perception of national-level threats from cyberattack -- whether "cyberwar" or "cybercrime" -- and its proposals and plans for meeting those threats in the ...

Creative recruitment more effective for hiring security talent
ZDNet Asia
By Ellyne Phneah , ZDNet Asia on January 4, 2012 (3 hours ago) Innovative strategies can sievecybersecurity talent and identify candidates with skills and mindset suited for changing security landscape, recruiters say. ...

What Techies Will Be Watching on the Hill
National Journal
By Josh Smith and Juliana Gruenwald From piracy to privacy, and cybersecurity to spectrum, Congress this year will be wading into several potentially blockbuster issues that could affect a wide swath of the tech community. Below are just a few of the ...

Skybox Security Announces Risk Control 6.0
MarketWatch (press release)
Skybox Risk Control combines information about software vulnerabilities, network infrastructure, information assets, and threats into a consolidated view of cyber security risks and also automates the steps needed to prioritize vulnerabilities ...

Raytheon buys enterprise architecture firm
ITWeb (blog)
“The addition of Henggeler will further strengthen Raytheon's capabilities and competitiveness incyber-security,” says Lynn Dugle, president of Raytheon's intelligence and information systems business, in an eWeek report. ...

Cyber-spying with Sophisticated Malware Expected in 2012
SPAMfighter News
Cyber-security experts have cautioned Internet-users about one dramatic expansion in cyber-spying as well as indicated that the criminals behind them are likely to utilize sophisticated forms of malware for intercepting stored data during the ...

Smart Grid Security Inadequate, Threats Abound
CIO
A lack of strict security standards and a hodgepodge of products have created today's chaotic state of utility cybersecurity. The good news is that new technologies offer promising solutions. By Mark Rowh CIO — Near chaos. That's the current state of ...

The Top 10 Looming Computer Security Threats of 2012
DailyFinance
By Dawn Kawamoto, The Motley Fool Posted 3:00PM 01/03/12 Technology, Crime Cyber-securityno longer means only protecting your computer from ne'er-do-wells. Hackers are cracking codes on all sorts of devices and getting sneaky about breaking into ...

GCHQ offers 'retention payments' to keep technology experts
The Guardian
The government has pushed hard to recruit the next generation of internet specialists, after admitting in October that it was failing to keep specialist cyber security staff. In response to the intelligence and security committee's annual report for ...

Cisco, General Dynamics C4 Systems, Panasonic Security, Videx, Wave Systems ...
MarketWatch (press release)
GENERAL DYNAMICS CYBERSECURITY Mr. Chris Daly, Director of Business Development forCybersecurity, General Dynamics C4 Systems /quotes/zigman/227407/quotes/nls/gd GD +2.39% , told us, "We offer a broad portfolio of secure communications and computing ...

EU Member States Unprepared for Maritime Specific Cyber-attacks [REPORT]
GCaptain (press release)
By Mike Schuler On January 3, 2012 The European Network and Information Security Agency (ENISA) has recently published its first ever report on cyber securitychallenges facing the EU Maritime Sector. The report, which is meant to highlight essential ...

GCaptain (press release)

Blind spots: How cyber defense is like stopping Tim Tebow
CSO
In one camp, we have salespeople, marketers, various security entrepreneurs and "experts" telling executive decision-makers that cybersecurity is straightforward, if you just do it their way. This is strikingly similar to sports pundits who insist that ...

CSO

McKenna Long Launches New Public Policy Blog
The BLT: Blog of Legal Times (blog)
The firm launched the Politics, Law and Policy Blog on Tuesday to focus on topics that include energy, infrastructure, health care, transportation, taxes, cyber security and campaign and election compliance, as well as the 2012 elections. ...

Your mobile's the target this year
Arab News
Cyber security companies including Imperva, McAfee, PandaLabs, Websense and many others expect that this year IT security threats will go mobile and social as individuals and companies continue to prefer convenience over safety. ...

Arab News

India in talks with Interpol to help intercept electronic communication
ZDNet (blog)
By Manan Kakkar | January 3, 2012, 11:55am PST Summary: Spy agency RAW gets green signal to tap anyone's communication while DoT and CBI in talks with Interpol on cyber security. India's ambitions to intercept communication over channels like RIM's ...

Stuxnet Computer Virus: Harbinger of Things to Come
Heritage.org (blog)
American security depends, in no small part, on cybersecurity in Mumbai and around the world. This creates a profound challenge for American policy. The reality is that cybersecurity is an international issue. If there ever is a cyber war, ...

GovWin Recon: Jan. 4, 2012: Panetta to Present Budget Strategy; DOD
govWin (blog)
Raytheon Buys Cybersecurity Firm [Texas TechPulse] – Raytheon purchased Henggeler Computer Consultants for an undisclosed amount. The buyer says the deal will help it cater to thecybersecurity, enterprise architecture and systems engineering needs of ...

U.S. Defense Strategy Review Focuses on Thwarting China, Iran
Bloomberg
The military services must work more cooperatively to pool their intelligence, surveillance and reconnaissance capabilities and cyber-security tools, as well as operational concepts, the review is expected to say, according to an administration ...

The Incredible Scale of the Internet
Heritage.org (blog)
Sometimes my friends and colleagues wonder why I fixate on cybersecurity and the Internet. I tell them all the time that it is the single most important and misunderstood problem in the world today, but often I don't think they understand the scale of ...

Estonia and USA support development of IT-knowledge in Belarus
The Baltic Course
According to Estonian Foreign Minister Urmas Paet, Estonia would like to increase awareness within Belarusian civil society of e-governance, opportunities to utilize information and communications technology, and cyber security, writes LETA. ...

The Baltic Course

My Trefis
Trefis (subscription)
Cyber Security - Innovation awaiting effort? Recognizing today's "bump" upwards in RIM's stock price was apparently caused by rumors of a shake-up in leadership from the current co-CEO Mike Lazaridis / Jim Balsillie to - perhaps - Barbar Stymies, ...

Advanced Security by ACE Expands US Army Mission Critical Cyber Security Training
PR-CANADA.net (press release)
Academy of Computer Education (ACE) announces the expansion of their Army Cyber Securitytraining courses. These courses are the top advanced security training classes in the industry and are particularly vital for individuals in the military. ...

New Pike Research Report Spotlights Growing Need for Integrated Approach to ...
MarketWatch (press release)
Cyber security -- New technologies are providing operators with real-time visibility into their industrial control systems and more proactive ways to maintain and optimize those systems. But these advances come with operating systems, applications and ...

McKenna Long & Aldridge Launches Blog
National Journal
... it says will examine "the impact of federal and state politics and public policies on a wide range of issues and debates, including health care, energy, infrastructure, taxes, transportation,cybersecurity, and campaign and election compliance. ...

BS25999 training strongly recommended when implementing a business continuity plan
EIN News (press release)
Business continuity should not be seen in isolation from cyber security; it is a key part of risk management and is closely related to the cyber resilience of organisations. The business continuity plan deals with the risk of business activities or ...

2012: The More Things Change ...
CIOUpdate
You'd think that in the fast moving, dynamic and constantly evolving world of cyber security that making predictions a whole year out would be, at the very least, extremely daunting. Sadly no. Because if there's one thing that really stands out when ...

Half north west companies will turn to cloud, says Melbourne
Manchester Evening News
The survey also found that cyber security and mobile computing rank highly among technology investment plans for 2012. Daniel Keighron-Foster, managing director of Melbourne, said: “Cloud computing has been round for many years, but this research ...

Officials decry lack of cyberweapons authority
The Daily Yomiuri
In its 2011 white paper, the ministry said cybersecurity is an important issue for any country. But a senior SDF official said the country's awareness, including the SDF's, of cybersecurity is too low. "Talking with people connected to the US forces ...

Stratfor Hack Shows Even Experts Use Awful Passwords
SecurityNewsDaily
Cybersecurity expert Johm Bumgarner told the Los Angeles Times that among the email addresses and credit-card numbers were some belonging to former US Secretary of State Henry Kissinger and former US Vice President Dan Quayle. ...

Euro Break-Up Most Overrated Risk: Eurasia Group
CNBC.com
Instead, Eurasia expressed concern over cyber security issues between the US and China. US-Chinese relations have already seen tensions over cyber security issues and “indigenous innovation”, a policy which promotes domestic innovation but which has ...

CNBC.com

FBI takes cybersecurity fight to global level | Simply Security
By Simply Security
The Federal Bureau of Investigation realizes that cybercrime has touched all corners of the world, with hackers working from Eastern Europe, Asia, the United States and elsewhere.
Simply Security

New SOeC Video: International Panel Discusses the State of Global ...
By Steve.Kovsky
A plenary session addressing global cybersecurity took place at Securing Our eCity's CybersecuritySymposium & Awards event on Oct. 25, 2011, in San Diego. The panel was moderated by Darin Andersen, General Manager, Norman Data ...
Securing Our eCity Blog

Cyber Security Awareness: The Price Of Free In The World Of Malware
By Lee
The biggest way that the bad guys are able to distribute their malware is through the use of pirated software and music. These are items that people will try to get all of the time. So much so, that they will not take the time to see if the pirated item ...
Security FAQs

Who can protect you from cyber crime and cyber attacks? Would ...
By kwright
Cyber security is an issue that all organizations must address. Consider these facts: Modern businesses and organizations must protect themselves from the growing threat of cyber attacks and cyber crimeCyber security is a senior ...
IT Governance Blog on IT governance,...

Philippine Govt Sites Hacked By PrivateX (#OpSecure) ~ VOGH ...
By VOGH Reporter
VOGH: VOICE OF GREYHAT| HACKING NEWS| SECURITY NEWS| CYBER SECURITY| HACKER NEWS: Philippine Govt Sites Hacked By PrivateX (#OpSecure)
VOGH: VOICE OF GREYHAT| HACKING...

Hey Big Spenders: Federal Infosec Market Poised for a Growth Spurt
By AlexOlesker
Cybersecurity is such a pressing issue that the U.S. government will be dedicating a good chunk of its annual information technology budget to protecting data systems from breaches, hackers and other threats. The number of cybersecurity ...
FedCyber.com

Bumper crop: Cyber security legislation - SC Magazine US
A slew of new bills affecting cyber security policies are making their way through Congress. Stephen Lawton takes a ... Cybersecurity Policy · Government. close ...
www.scmagazine.com/bumper-crop-cyber-security.../221040/

Richard A. Clarke joins Identive board of directors -- Federal ...
Cybersecurity expert Richard Clarke lands new gig. Former presidential adviser Richard A. Clarke begins the new year as a member of Identive Group's board ...
fcw.com/blogs/circuit/.../richard-clarke-identive-board_0.aspx

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com