DHS takes key role in DOD cybersecurity program

DHS takes key role in DOD cybersecurity program
FCW.com
With DHS now in on the program, it's evolved into the Joint Cybersecurity Services Pilot (JCSP), according to a DHS privacy assessment. “The JCSP seeks to build upon the DIB Opt-In Pilot and allow DHS, through the National Cyber Security Division US ...

Senate to Consider Cybersecurity Overhaul
Computerworld New Zealand
Majority leader Harry Reid is poised to bring long-debated cybersecurity legislation to floor in hopes of broad bipartisan support, according to comments from his senior aide at the State of the Net conference. By Kenneth Corbin | Washington | Thursday ...

NIKSUN's Dr. Parag Pruthi is Honored by IEEE 2011 Region 1 Award for ...
MarketWatch (press release)
In August 2011, the IEEE Region 1 Board of Governors acted to recognize Dr. Pruthi's achievements in the field of cyber security. Since 1997 Dr. Pruthi has continuously contributed to the field ofcybersecurity through patented research tied together ...

McDonnell announces cyber security marketing effort
Augusta Free Press
Bob McDonnell today released a report on the cyber industry in the Commonwealth of Virginia that will be used in marketing Virginia as the best place in the country to start or relocate a business in the cyber security field. ...

Augusta Free Press

SEC Guidance on Disclosing Cybersecurity Risks
JD Supra (press release)
(Cybersecurity and the Public Company: Keeping Your Disclosures Safe and Sound After Cyber Monday by Manatt, Phelps & Phillips, LLP) “Cyber security risk disclosure must adequately describe the nature of the material risks and specify how each risk ...

Digital danger zone: Tackling cyber security
ArabianOilandGas.com
The widespread use of interconnected networks and control systems in national oil, gas, power, water and electricity sectors, means there is now a very real and growing need to enhance cyber security, highlighted by an ever increasing number of ...

ArabianOilandGas.com

A bogus threat still reflects on cyber-security
The National
The facts are still not fully clear about reported cyber-attacks on Israeli and Gulf websites. At worst, however, what happened seems to have been little more than sophomoric online vandalism. But the story reminds us that the computer networks that ...

Booz-Allen Hamilton launches cybersecurity network
FederalNewsRadio.com
Defense contractor Booz Allen Hamilton has launched a cybersecurity network to link centers and labs. The company says the network can virtually connect clients in or outside government with thousands of cyber experts, technologies and solutions. ...

White House Objects to DNS Blocking; Focus Turns to Protect IP Act Debate
BNA
“But we will not support legislation that reduces freedom of expression, increases cyber securityrisk, or undermines the dynamic, innovative, global Internet. And that's the approach and the balance that we think needs to be take as we work through ...

Government Websites hacked, what next?
Business Daily Africa
By Roy Akalah (email the author) For ISACAKenya, we think it is a wakeup call for everyone, to realize that Cyber Security is not a one-man or woman show. Just like the ongoing "Linda-Nchi" initiative in Somali where we are all affected - each and ...

Business Daily Africa

Booz Allen starts cybernetwork
UPI.com
18 (UPI) -- A network of cybersecurity centers and stations for US government and industry has been established by Booz Allen Hamilton. Called Booz Allen Cyber Solutions Network, the network connects clients with the company's cyber experts for ...

Utilities Give Tech Advice at Grid-Interop
Electric Light & Power
By Kathleen Davis, Senior Editor The importance of cybersecurity, the desire for plug-and-play technology and understanding how utilities must change with the smart grid future are just three of the lessons from the final utility implementation ...

Companies told to report cyber attacks
Sydney Morning Herald
AFP's Mr Marden confirmed CERT Australia should be the initial point of contact forcyber security incidents impacting upon Australian networks. Businesses should contact the CERT Australia hotline on 1300 172 449, and depending on the circumstances, ...

Sydney Morning Herald

Combating cyber crime
Gazette.Net: Maryland Community News Online
by Cindy Long, Special to The Gazette Don't miss the Cyber Security meeting beginning at 7 pm today at the West Laurel Community Building, 16501 Supplee Lane. Thanks to the diligent efforts of West Laurel's Beth Evans, we are very fortunate that Agent ...

Will 2012 be the dawn of DNSSEC?
Techworld.com
Cybersecurity experts are urging IT departments to invest in DNSSEC now - before a high-profile attack occurs that could have been prevented by readily available DNSSEC-compliant appliances, software and services. Already, the new year has brought one ...

'What the Power Industry has to Learn about Cyber Vulnerability Disclosure ...
MarketWatch (press release)
Manimaran Govindarasu and Adam Hahn take on the moving target of cyber security disclosure, how expanded cyber dependencies and greater public exposure will increase potential impacts from software vulnerabilities. Developing formal disclosure policies ...

USAF Chief Scientist Joins Line-Up at AFA's Second Annual CyberFutures Conference
MarketWatch (press release)
18, 2012 /PRNewswire via COMTEX/ -- The US Air Force's chief scientist, Dr. Mark T. Maybury, will join an agenda full of Air Force leadership, industry experts, and current cyber security specialists at the Air Force Association's 2012 CyberFutures ...

Intelligence gathering may be key against cyber attacks
Siliconrepublic.com
“That means collecting reliable cyber security data and researching prospective cyber adversaries to better understand risk and learn about why and how attacks occur. “It means developing new skills in the IT team to produce and analyse intelligence ...

Siliconrepublic.com

In Letter to EU's Presidency, BSA Outlines Policy Priorities to Advance a ...
ag-IP-news Agency
BSA is delighted to see that the issue of cybersecurity and a potential EU cybersecurity strategy will be a priority on the EU Agenda in 2012. Cybersecurity is a fast-paced race. We must have leeway to adapt quickly and stay ahead of cyber threats, ...

Victims of Zappos Breach Wary of Company's Response
IT Business Edge (blog)
By date: The Zappos breach is generating a lot of conversation among people who have no interest whatsoever in overall cybersecurity. When places like Lockheed Martin or RSA suffer a breach, the average person doesn't think twice about it. ...

What's ahead in 2012 for cloud, mobile apps, cyber?
Washington Technology
By David Hubler Expect disruptive technologies – cloud computing, mobility, social computing, big data and smart analytics, IT appliances, and cybersecurity – to become more tightly woven into mission-critical systems and processes in 2012 as ...

SOPA Forces Obama To Pick Sides Between Donors From Hollywood, Silicon Valley
Huffington Post
14 statement -- written by Victoria Espinal of the Office of Management and Budget, Aneesh Chopra, US chief technology officer, and Howard Schmidt, White House cybersecurity coordinator -- on the side of tech community. A more recent convert to the ...

Chinese virus targets DoD Common Access Card
ArmyTimes.com
Once embedded, it logs the users' keystrokes to obtain personal identification numbers or codes associated with that card and user, according to AlienVault, a Silicon Valley-based cyber securityfirm. “Basically, they are able to steal the PIN and then ...

Voters may have say on council vacancies
San Antonio Express
The council selected Leticia Ozuna, a cyber-security specialist, to replace her. While some council members lauded the appointment for its transparency — it was the first time a 2010 ordinance outlining a formal process had been used — they lamented ...

Timeline Brings Privacy Concerns
WOWT
Cyber security exert Chris Hoke, of Omaha's Continuum Worldwide, says the format can indeed be confusing. He made the switch a while back and noticed it complicates privacy settings. "Going back through it,” Hoke said, “there were a lot of things I ...

Parliament told that SA needs a national cyber-policing strategy
Business Day
Prof Solms said a draft cyber-security strategy was circulated in 2010 by the government but nothing further had been heard of it. Without a cyber policing unit with compliance inspectors, cyber crime and cyber terrorism would just increase. ...

Suspicion grows China was behind hack of US commission
Reuters UK
Secondly, said the sources, the fact that Reinsch's NFTC emails were the principal target suggests that whoever hacked them was hunting for a soft target with poor cyber-security. That fits a pattern of what is known as a blended attack: sophisticated ...

New, Extra-Deceptive Malware Threat
WOWT
"It's a class of malware, similar to a virus or that type of thing that installs in your computer,” said cyber security expert Chris Hoke, of Continuum Worldwide in Omaha. “So when you log into your bank, you do balance transfers, you do online ...

Initiative trying to bring more power to Huntsville
The Huntsville Times - al.com
Energy security, says Energy Huntsville Working Group Chairman Dale Jobes, also ties into cyber security. Those tornadoes, he said, had almost the same effect as a terrorist attack to the local energy infrastructure. One goal, especially for the ...

The Huntsville Times - al.com

The Targeting Of Children's Websites By Hackers Is A Worrying New Trend
SourceWire (press release)
The cyber-security arms race continues to ratchet upwards, with each newly-discovered virus very quickly accounted for in anti-virus software. In addition, public awareness of the malware threat has increased markedly, compared to the happy innocence ...

EARNINGS PREVIEW: US Defense Cos See More Pentagon Pressure
Wall Street Journal (India)
Key Issues: Raytheon is among the defense companies that have been diversifying into growing areas such as cybersecurity and seeking international growth in response to continuing US government efforts to rein in defense spending. ...

EXCLUSIVE: Hollywood Moguls Stopping Obama Donations …
Deadline.com
The trio said that they “will not support legislation that reduces freedom of expression, increasescybersecurity risk, or undermines the dynamic, innovative global Internet.” Intellectual Property Enforcement Coordinator Victoria Espinel, ...

Telcordia Applied Communication Sciences Becomes Wholly Owned Subsidiary of ...
MarketWatch (press release)
Applied Communication Sciences will continue to deliver research and advanced network solutions, with an emphasis on cyber security and critical infrastructure protection (CIP), cyber integration and emergency preparedness for its key customers in the ...

CIOs influence growing around mission, budget, survey finds
FederalNewsRadio.com
Moving out of budget areas, CIOs and deputy CIOs on average ranked cybersecurity as their top priority with mobile computing, cutting IT spending on administrative functions, IT program and project management and cloud computing among the next set of ...

Should Cyber Security Go On the Offensive? | SecureWorld Post
By jacob
Should Cyber Security Go On the Offensive? By jacob On January 19, 2012 · Leave a Comment · In Uncategorized. Frustrated with the seemingly impossible task of protecting their networks, more security pros are ready to take the fight to the ...
SecureWorld Post

On NPR: UMass Cybersecurity Expert (me) Examines Zappos ...
By emeryberger
My interview today with our NPR affiliate New England Public Radio went from Zappos to broader security to a discussion of the End Times (more or less)! http://www.nepr.net/news/umass-cyber-security-expert-examines-zappos-security- ...
Emery Blogger

What is SOPA? And is it as bad as everyone says it is? Part 2 - Terry ...
By tzink
What is SOPA? And is it as bad as everyone says it is? Part 2. MSDN Blogs > Terry Zink's Cyber Security Blog > What is SOPA? And is it as bad as everyone says it is? Part 2. What is SOPA? And is it as bad as everyone says it is? Part 2. tzink ...
Terry Zink's Cyber Security Blog

Parag Pruthi is Honored by IEEE 2011 Region 1 Award ... - ITbriefing
In August 2011, the IEEE Region 1 Board of Governors acted to recognize Dr. Pruthi's achievements in the field of cyber security. Since 1997 Dr. Pruthi has continuously contributed to the field ofcybersecurity through patented research tied ...
ITbriefing.net

How Good is Cyber-Security Worldwide? | PRI's The World
Marco Werman talks with Tim Maurer, a fellow at the Global Public Policy Institute , about hacking and cyber-security worldwide.
www.theworld.org/2012/01/cyber-security-worldwide/

2011 in Cybersecurity
2011 was a watershed year for cybersecurity, but it was evolutionary rather than revolutionary. Political hacking, industrial skullduggery, drones gone wild, and ...
ctovision.com/2012/01/2011-in-cybersecurity/

Lockheed Martin · Cyber Security Alliance
At Lockheed Martin, cyber security is more than a core competency. We understand it, we apply it, and more importantly, we integrate and embed it into every ...
www.lockheedmartin.com/us/.../cyber-security-alliance.html

2012 IT Prediction: CyberSecurity Operations Take the Offensive ...
In this proactive approach, hybrid (physical and cyber) security operations models will employ dedicated analysts coupled with advanced data analytics ...
blogs.unisys.com/.../2012-it-prediction-cybersecurity-operatio...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com