Cybersecurity, Google privacy, Megaupload

The Circuit: Cybersecurity, Google privacy, Megaupload
Washington Post (blog)
By Hayley Tsukayama LEADING THE DAY: The Senate will turn its attention to cybersecuritylegislation this week. A vote on an as-yet-unreleased comprehensive cybersecurity legislation is scheduled for this week, The Hill reported, and it could face some ...

The Cyber Security Market 2012-2022
Sacramento Bee
As a consequence, Visiongain has determined that the value of the global cyber security market in 2012 will reach $61.10bn. Cyber security operations, solutions, and products are now standard across business, government, military, and personal networks ...

How to tackle cybersecurity
The Senate is about to consider cybersecurity legislation. Ensuring the integrity and safety of our nation's critical infrastructure is a bipartisan issue that Congress and President Barack Obama must work together to tackle.


Senate cybersecurity bill sparking concerns about government control
The Hill (blog)
By Gautham Nagesh - 01/29/12 01:38 PM ET A comprehensive cybersecurity bill set for a vote in the Senate this week is drawing some late concern from the tech industry that could threaten several years of legislative work. The bill has not been released ...

Israel, Finland and Sweden top for computer security
Financial Times
By James Blitz in London Israel, Finland and Sweden are judged to be the nations which are most resilient to cyberattacks on their public and private computer systems, according to an in-depth study into cybersecurity published on Monday by a ...

Auto Hacking Seen as Growing Risk With Electronics Frenzy: Cars
While safety and entertainment systems are intended to be separate, “it is not evident that this separation has been adequately designed for cybersecurity concerns,” the academy wrote. It agreed with US regulators who said they found no evidence the ...

CyberPoint Recognized by Baltimore Magazine as One of the "Best Places to Work ...
MarketWatch (press release)
30, 2012 /PRNewswire via COMTEX/ -- CyberPoint International, LLC, a global provider of cyber security products, solutions, and services, has been recognized as one of Baltimore Magazine's "Best Places to Work 2012." This is the second consecutive year ...

Global Cyber Regulations Needed to Combat Attacks, Study Finds
Global cybersecurity standards are needed to prevent attacks against power grids, communications networks and financial institutions, a study for Internet- security provider McAfee Inc. (MFE) found. The US and other countries should create regulations ...

Malaysia Hopes For GCSA To Be Set Up Soon - Ongkili
BANGI, Jan 30 (Bernama) -- Malaysia hopes the establishment of the Global Cyber SecurityAlliance (GCSA) could be expedited in efforts to strengthen its cyber defence capabilities, especially involving the Critical National Information Infrastructure ...

Baltimore's Lookingglass raises $5 million round of financing
Baltimore Sun (blog)
Lookingglass Cyber Solutions, a Baltimore firm which makes some cool cyber security software that gives organizations global insight into cyber threats, said Monday morning that it raised $5 million in a series A round of financing.

How Should Hyperlocal Sites Handle User Information?
Street Fight
In a speech before the National Cyber Security Alliance on January 26, 2012 in Washington, Commissioner Brill insisted that greater transparency must be provided to users about what is being done with their personal information.

Street Fight

Senate OKs anti-cybercrime bill
GMA News
The Information and Communications Technology Office of the Department of Science and Technology shall likewise create a National Cyber Security Center to help in the formulation and implementation of a national cybersecurity policy.

Keeping personal information from cyber crime
University Daily Kansan
“Cyber security isn't just about credit information or social security numbers, it's also about your privacy and personal information,” said David Day, communications coordinator for the University. Day said that one of the simplest ways to remain ...

Trend Micro shares tips to protect privacy
Business Mirror
Trend Micro joins the National Cyber Security Alliance and several other notable institutions in celebrating Data Privacy Day to champion data security. “Privacy is our individual responsibilities. We cannot always expect or assume that Internet ...

Why Your Company Needs To Hack Itself
Fast Company
BY Neal Ungerleider Sun Jan 29, 2012 Computer security expert Jeremiah Grossman thinks that traditional cybersecurity doesn't have what it takes to fight off today's wired intruders; he advocates companies and governments invite hackers to find weak ...

Fast Company

Cyber Defence Summit
Help Net Security
The Cyber Defence Summit is gathering key regional stake holders in Muscat, Oman to discuss the heightened importance of cyber security throughout the entire Middle East. Under the theme 'Defending your virtual borders' the invitation-only initiative ...

Center offers security tips
Monroe News Star
The Center for Internet Security (CIS), a national nonprofit focused on enhancing the cyber security readiness and response of public and private sector entities, has issued tips to help users protect themselves and their information ...

Wanted: Ethical hackers
Business Standard
At present, the number of certified security professionals in India is estimated at 22000 by Cyber Security and Anti Hacking Organisation, while another report by Nasscom says that India needs about 77000 ethical hackers every year.

Anzac joint crisis unit abandoned
The Dominion Post
New Zealand and Australia have stepped up co-operation on cyber security and counter-terrorism. But both countries appear to have abandoned a proposal to create a joint ready-response force, with Defence Minister Jonathan Coleman yesterday signalling ...

Sourcefire launches FireAMP anti-malware product
Telecompaper (subscription)
Intelligent cyber security provider Sourcefire has introduced FireAMP, a malware discovery and analysis product that analyses and blocks malware by utilising big data analytics. It is designed for large enterprises and Sourcefire says delivers the ...

MTN Satellite Communications Appoints Margaret E. Grayson as Chief Financial ...
MarketWatch (press release)
Ms. Grayson is an expert in cyber security and information sharing, and has participated in several comprehensive studies designed to provide the President, through the Secretary of Homeland Security, with guidance and recommendations on the security ...

Firewalls and firearms
McGill Daily
This expanding threat has led a number of countries to ramp up their development ofcyber-security as well as cyber-warfare tools. After alleged Hezbollah cyber-attacks, Israel rapidly transformed itself into one of the major players in cyber warfare.

McGill Daily

Media Cheat Sheet 01/30/2012
How did Israeli cyber-security rank so highly in a study? And what to make of reports that Syria's first lady tried flee the country? • Palestinian activists tell AP that the Fatah and Hamas have created an environment of intolerance in the West Bank ...

Dutch DigiD vulnerable to DDoS attacks - NCSC
Telecompaper (subscription)
The Dutch National Cyber Security Center (NCSC) has warned that the ICT servers of the minister of interior could be vulnerable, with DigiD open to DdoS attacks. Logius is set to upgrade thes server environment on 6 February.

Pentagon punts on major program cuts
Federal Times
Even cybersecurity funding, one of the few areas where investment will increase, will be focused on fixing vulnerabilities rather than advancing capabilities. "There will be an approach to review a lot of our cyber capabilities," Chris Coleman, ...

MacAulay-Brown Awarded $75 Million Contract by Air Force Special Operations ...
MarketWatch (press release)
For over 30 years, customers have relied on MacB to provide a broad range of technology services, solutions and management support in the areas of Cybersecurity, Information Operations/Warfare, Intelligence, Surveillance and Reconnaissance, ...

Smart metering - the next big waste of money or venerable project? (blog)
Government plans to create a smart grid for energy networks will require a coordinated focus oncybersecurity as communication networks play a key role, according to a report from The Energy Networks Association (ENA). The ENA published the report for ...

More caution needed against cyber stalking
Daily Aztec
One in five Americans (19 percent) has been affected by online stalking or “aggressive outreach incidents” according to a recent study released by the National Cyber Security Alliance. Persistent emails, identity theft and harassment are all prime ...

Content, Copyright & The Internet -- The Reality
Indeed, solid research and well balanced analyses from investors, law professors, Internet engineersand cyber security experts helped inform the outrage and direct the action by Internet users. Even those who knew nothing of SOPA and PIPA before the ...

Transcript of joint Aust/NZ PMs' press conference (press release)
One of the key security challenges of our age is cyber security, so a relationship as old and as deep as this one needs to be taken into the future and deal with contemporary challenges, like cyber security. We've agreed to develop a six month trial ...

Flournoy Discusses State of World as She Leaves Office
Department of Defense
Flournoy saw increased emphasis on cybersecurity and expects operations in cyberspace to become more important in the years to come. Her office gets involved because the domain is so new, and experts are puzzling over what constitutes an attack.

Department of Defense

Lockheed Martin leads expanded lobbying by US defense industry
Washington Post
Lockheed's F-35 While Lockheed Martin's defense portfolio spans missiles to cybersecurity and shipbuilding, its top program is the F-35 Joint Strike Fighter, which Congress last year scrutinized over delays and cost overruns. The F-35 is the Pentagon's ...

Inventors, Entrepreneurs, and Makers of All Things Technical and Scientific ...
MarketWatch (press release)
"The 'hackerspace' groups that have come together across the country are providing volunteer assistance to the defense industry and cyber-security industry, and they are now making an impact on assistive technology for individuals with disabilities, ...

Aoun rallies presidents to support homeland security funding
The Kostas Research Institute will build on its strength in explosives detection,cyber security, underwater robotics and national resilience. Aoun's leadership in forming this coalition aligns with Northeastern's commitment to use-inspired research...


Your Data Has Probably Already Been Stolen
“Many of the cyber security experts agree that the bad guys do have a lot of data,” says Mustaque Ahamad, director of the Georgia Institute of Technology's Information Security Center. “But for them to actually profit from that is a little harder than ...

For Journalists, Cyber-Security Training Slow to Take Hold ...
By Blackmere
For Journalists, Cyber-Security Training Slow to Take Hold – Published January 30, 2012. For centuries, journalists have been willing to go to prison to protect their sources. Back in 1848, New York Herald correspondent John ...
Blackmere Consulting

New Version of HR 3674, 'the' House Cybersecurity Bill
By PJCoyle
6. Assessment of Sector by Sector Cybersecurity Preparedness. Please note that §5 provides for training fusion center personnel in IT security practices to protect their information systems, not about cyber security threat assessment. It would ...
Chemical Facility Security News

Dataquest : Top Stories : Quarantining Cyber Space for Cyber Security
Deliberate attacks on the cyber space of the government bodies has brought forth a new dimension of political rivalry and war between nations.

There needs to be a collective approach to ensure cyber security ...
By Conservative Home
Established by parliament in 1994, the Intelligence and Security Committee provides democratic scrutiny of the finances, policy and administration of our three intelligence agencies – MI5, MI6 and GCHQ. Only two decades ago it was ...
ConservativeHome's Parliament Page

Prison » Big Brother Internet
By admin
Considering the apocalyptic rhetoric coming from Washington and the ranks of cybersecurity experts – echoed by media reports that portray every picayune data breach as Armageddon – it would appear that the vulnerability of the Internet has ...

DOD public-private cybersecurity program test run expanding into ...
DOD gives DHS expanded role in cybersecurity program ... seeks to build upon the DIB Opt-In Pilot and allow DHS, through the National Cyber Security Division ...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud