GSA requiring cybersecurity plans from IT contractors

GSA now requiring cybersecurity plans from IT contractors
FierceGovernmentIT
6 all prime- and sub- contractors providing the General Services Administration with information technology supplies, services or systems are required to submit an IT security plan outlining compliance with federal cybersecurity regulations. ...

ITA launches Cyber Security Forum
Oman Daily Observer
By Kaushalendra Singh - MUSCAT — Maintaining pace with time, the Information Technology Authority (ITA) has launched a Cyber Security Forum to strengthen its on-going Oman Computer Emergency Readiness Team (OCERT) Ambassador Programme. ...

Obama Announces Leaner Defense Strategy with Emphasis on Cybersecurity
Criminal Justice Degree Schools
This will require superiority in the arena of cybersecurity, something most recently proved by Iran's alleged ability to “spoof” an advanced top-secret US spy drone by overriding its onboard guidance program to take control of it. ...

Criminal Justice Degree Schools

Hackers publish email addresses
The Press Association
Cyber-security expert John Bumgarner has identified the email addresses of 221 Ministry of Defence officials, 242 Nato staff, 67 Scotland Yard and other police personnel, 45 civil servants from the Foreign Office, 14 from the Home Office, ...

Texas Lyceum selects two new directors from San Antonio
San Antonio Business Journal
10 at the Texas Capitol for San Antonio cyber security expert and former US Air Force officer John Dickson as the organization's new president. In addition to Dickson's appointment as president, 20 new directors have been selected to join the group ...

Washington companies have spots in electronics show
Washington Post
Though the region ranks among the top markets for technology talent, those skills more often are applied to fields such as information technology, cybersecurity and software. But the region will not go unrepresented at this year's International ...

US Department of Homeland Security to keynote the Social Media Conference on ...
WebWire (press release)
US-CERT is the operational arm of the National Cyber Security Division (NCSD) at the Department of Homeland Security. US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing and proactively manage cyber ...

ManTech Enters the Healthcare IT Market with Acquisition of Evolvent Technologies
MarketWatch (press release)
Evolvent provides services in clinical IT, clinical business intelligence, imaging cyber security, behavioral health, tele-health, software development, and systems integration. Its systems and processes enable better decision-making at the point of ...

Defense Cloud Security Vulnerable to Chinese Tampering
AllGov
The Department of Defense is investing heavily in cloud-based computing that relies on software developed in China—the same country deemed a major cybersecurity threat to the United States. In order to shift military operations to the cloud, ...

AllGov

Becrypt extends its commitment to the Channel with appointment of new Head of ...
Response Source (press release)
Becrypt, supplier of cyber security solutions to the UK Government, MOD and wider public sector has appointed Jo-anne Patterson Head of Channel and Alliances UK. The new appointment is part of Becrypt's renewed strategy to focus on building and ...

Cambridgeshire-based company says information security staff training is more ...
Cambridge Network
Promoting the development of “a cadre of skilled cyber security professionals” has been also deemed a priority in the UK Government Cyber Security Strategy published in November 2011. Calder says, “Poorly-trained technical staff may mean inadequate ...

Cyber Attack on Israel – The Private Sector and Citizens as the “Soft Underbelly”
Security Debrief
American cybersecurity policymakers have not yet been able to figure out how to safeguard all of the federal government (or who essentially has responsibility for what), let alone help protect state and local governmental entities. ...

Security Debrief

Myricom 10-Gigabit Ethernet Solutions Now Available Through Distributor Info X
MarketWatch (press release)
... President for Info X. "Myricom's extreme performance product portfolio will further strengthen our 10GE high performance connectivity offerings for Financial Trading, Cybersecurity, Video Streaming, Video Editing, and High Performance Computing. ...

(ISC)²® Announces Newly Elected 2012 Board of Directors
PR Web (press release)
... and professor of Forensic Computing (Australia) “Given the growing intensity of global security threats and the deepening need to fill the pipeline of cyber security professionals, the fresh, diverse perspectives and expertise of these new members ...

Monday's Top Secret Homeland Security meeting
Examiner.com
... border security, examine US Coast Guard counterterrorism efforts; provide an operational update of the Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on ...

Should Wordpress.Com Be Blocked In India For Copyright Violations?
Cjnews India (blog)
Even another article titled mobile banking cyber security is required in India has been posted without permission. Complaints with Wordpress.Com were made on three different grounds yet Wordpress is adamant upon using DMCA procedure to remove apparent ...

Cjnews India (blog)

2012- Year of mobile, social network attacks with focus on identified theft
The Island.lk (subscription)
By Ravi Laddduwahetty The Centre for Integrated Communication Research and Agency, an institution that specializes in the prevention of cyber security threats, through education and penetration testing, has released its predictions on cyber security ...

Looking Back at Cyber in 2011, With Some Forward Looking Too
Security Debrief
More schools are trying to educate professionals and policy makers about cyber (I teach in a Homeland Security Management Masters program, and they are adding a certificate in Cyber Security Policy with a separate Masters to follow). ...

Anti-spam plan lacks teeth: prof
The Kingston Whig-Standard
His work with the laboratory has him investigating problems with cyber security, counter-terrorism, financial fraud and some law enforcement, Skillicorn explained. And from where he stands, the anti-spam centre the federal government is set to launch ...

Company president Carol Craig orchestrates a dream come true
Florida Today
Its many clients include NASA, US Air Force Space Command Cyber Security and Chief of Naval Air Training. during its Thursday rehearsal, the orchestra will have no guest artist during Saturday's “Salute to John Williams” pops concert . ...

CSC CloudCompute for Government Offers Federal Community Cloud That is Built ...
MarketWatch (press release)
CloudCompute for Government combines the powerful, fully integrated cloud fabric of VCE's Vblock with CSC's proven expertise in managed services and cybersecurity. Vblock combines leading virtualization software from VMware; unified networking, ...

UC engineering dean has high hopes for Chinese partnership
Contra Costa Times
Instead, when he's not engaged in budget-related meetings, Sastry has been consumed with his current passion -- cyber security, and the university's new partnership with Shanghai Zhangjiang Hi-Tech Park. "There are wireless devices being built into ...

Tech, biotech advocates push for funding
Washington Post
Levi said the governor's proposal to spend $2.3 million over the next two years to bolster the state's competitiveness in growth areas, specifically simulation and modeling and cybersecurity, will be needed to make up for cuts. ...

Dyess could be fit to thrive: Former commander says B-1s key
ReporterNews.com
Obama wants to put an emphasis on Special Operations Forces, cybersecurity and Unmanned Aerial Vehicles. And he pledged the country would still have a superior military. Big Country US Rep. Mac Thornberry, vice chairman of the House Armed Services ...

Professor Ted Hamilton opens Great Decisions Discussion series
Pine Tree
January 29th – Brian Thomas, Technology Specialist, Calaveras Office of Education – Cybersecurity– The securitization of cyberspace has caused a sea of change for both governments and the private sector, faced with new threats, new battlegrounds and ...

Meters are smart, not scary, FPL says
The News-Press
Or that they can be hacked and pose a cyber-security risk. According to FPL, these claims are false or seriously overblown. Talking on a cellphone held to your ear delivers, at a minimum, 250 times the radio frequency level of a smart meter, ...

Kaspersky Lab Cyberthreat 2012 forecast
MyBroadband
“We selected these stories because they point to the major actors of 2011 who will no doubt continue to play a major role in the cyber-security blockbuster which is just around the corner,” according to Raiu. “At the moment, the majority of incidents ...

MyBroadband

Netflix Debuts In The UK, PayPal Testing Mobile Payments At Home Depot, Israel ...
Fast Company
Israel has responded sternly to the cyber security breach last week, supposedly perpetrated by a Saudi-based hacker, in which thousands of Israelis had their credit card details stolen and published. Reuters reports that Israel was viewing the attack ...

Hacked memo leaked: Apple, Nokia, RIM supply backdoors for gov't intercept?
Computerworld (blog)
Meanwhile cybersecurity guru Bruce Schneier agreed that exposed source code is not a big deal, but "Bad press is certainly Symantec's biggest worry right now." According to The Atlantic Wire, Schneier said, "The source code might have huge smoking guns ...

US cuts may be Canada's gain: expert
The Kingston Whig-Standard
The US navy's 11 aircraft carrier battle groups are to remain and more resources would be placed on special forces, intelligence and cyber security and warfare. The budget cuts are also meant to send a political message to potential rivals around the ...

Washington shifts focus
Bangkok Post
The US military is a potent security force, and we can expect to see more drones andcyber-security teams, just for starters. But it is also a superior relief force, as seen during the 2004 tsunami. And as always, the world's only superpower can ...

Bangkok Post

12 Canadians changing the way we think
Toronto Star
In the year ahead, Diebert warns, the challenge is to “keep up with the growing cyber securityindustrial complex that is transforming the Internet.” And he says, “Cold War giant” companies are linking up with smaller ones to peddle censorship software ...

Information technology forecasts for 2012
Manila Bulletin
One of the key cybersecurity trends that organizations should note moving into 2012 is the continual increase of Advanced Persistent Threats (APTs), a type of targeted attack that uses a wide variety of techniques. 2011 saw the foundation for the next ...

Albania - Deputy Prime Minister and Minister of Foreign Affairs, Mr. Edmond ...
ISRIA (registration)
He stressed that Albania has a growing contribution to the security of the region and beyond, it was adapted successfully and continuously to face the new challenges, such as terrorism, proliferation of weapons of mass damage, cyber security, ...

2012 International Conference on Cyber Security Held at Fordham ...
By Blackmere
From January 9 through 12, 2012, Fordham's Lincoln Center campus hosts the third annual International Conference on Cyber Security (ICCS 2012), an event where the Federal Bureau of Investigation (FBI) and the Fordham University unite ...
Blackmere Consulting

Cyber Security Crucial to Economic Security - from ITbriefing.net
9, 2012 "> "The rapid pace at which cyber security threaten changes, means that no country/organisation can plan and implement responses in silos. Effective cyber security efforts require expertise that transcend national and organisational ...
ITbriefing.net

It Gift Shopping Scams | Blog Central
By Kim Eichorn
Consumer Blogs. Consumer Threat Alerts (18); Cyber Security Mom (180); Cyber Security Mum – Australia (22); Cyber Security Mum – India (39); Family Safety (56); Identity Theft (101); Robert Siciliano (120) ...
Blog Central » Cyber Security Mom

Cyber Security Awareness: Avoiding The Threat Of Identity Theft
By Lee
First of all, make sure you are very careful with who you give your social security card number to. Those numbers are the gateway to your identity and if anyone is able to get a hold of them then you are in trouble. Your name identifies you to a ...
Security FAQs

Chemical Facility Security News: DHS Updates CIP Landing Page
By PJCoyle
Unfortunately the cybersecurity page provides very limited information on a key function of most of the 18 sectors; industrial control systems. In fact, there is only one ICS specific link on the page; it goes to the 'Control Systems Security Program ...
Chemical Facility Security News

Homeland Security Today: Industry Experts Praise Cybersecurity ...
With Congress starting to truly move forward on cybersecurity legislation, the private sector has been expressing some enthusiasm for the direction some of the ...
www.hstoday.us/.../bf6b19d09aa3452402dfa4ec57ab08b2.ht...\
A Blueprint for Cyber Security
Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for Homeland Security Enterprise a sign of changing times for ... cyber security blueprint. Take a ...
www.continuityinbusiness.com/.../a-blueprint-for-cyber-securi...

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com