Iran Mounts New Web Crackdown

Iran Mounts New Web Crackdown
Wall Street Journal
"They want to execute a plan where no one has protection, so they can trace whoever is involved in what they perceive as antigovernment activity at any given moment and at any location," said Ehsan Norouzi, an Iranian cybersecurity expert who left Iran ...

Wall Street Journal

Lawmakers seem intent on approving SOPA, PIPA
Macworld
"I'm not very encouraged, quite frankly," said Paul Ferguson, senior threat researcher at Trend Micro, a cybersecurity vendor with concerns about the bills. "There's a lack of technical knowledge here in the legislative process. ...

Obama's Defense Strategy Emphasizes Asia, Cybersecurity
BusinessWeek
The new strategy outlined today calls for investments in cybersecurity to defeat electronic attacks, in expanded space- based intelligence platforms and for “developing a new stealth bomber.” At the same time, it raises the possibility that US ...

Border, cybersecurity, trade top agendas of Texas lawmakers in 2012
Houston Chronicle (blog)
(AP photo) US-Mexico border security, increased international trade and cyber security are among the issues Texas lawmakers plan to tackle in 2012. Using technology, helicopters and airplanes is part of an Obama administration plan to secure the ...

Houston Chronicle (blog)

Two day workshop on Cyber Security commences at IMG
Kerala IT News
Tvm: The 'Mid-Career interaction between Armed Forces and Civil Services Officers on Cyber Security' began today at the Institute of Management in Government at Thiruvananthapuram. About 25 senior officers from the Armed Forces and Civil Services (IAS, ...

Dept. of Energy developing project to reinforce grid cybersecurity
Network World
The US Department of Energy today announced what it calls an "Electric Sector Cybersecurity Risk Management Maturity" project that will let utility companies and grid operators measure their current capabilities and analyze gaps in their cyber defenses ...

BITS: Tackling Fraud in 2012
BankInfoSecurity.com
So, how will BITS' new VP of cybersecurity and fraud prevention help banks mitigate those risks? One way: by bringing key thought-leaders together. "We provide many forums for discussion," Carlson says in an interview with BankInfoSecurity's Tracy ...

BankInfoSecurity.com

Defense Bill Approves Offensive Cyber Warfare
InformationWeek
The act directs the secretary of defense to acquire more advanced cybersecurity capabilities to "discover and isolate" successful attacks for which signatures haven't been developed. The capabilities will need to be "adequate to enable well-trained ...

NDU's iCollege focuses on getting beyond checklist cyber approach
FederalNewsRadio.com
By Jack Moore A team from the National Defense University's iCollege, which was recently honored by the the Defense Department's office of the chief information officer for a special cybersecurityworkshop, joined Pentagon Solutions. ...

5 Hot Technology Policy Agenda Items You Need to Watch
IDG News Service
From providing more spectrum space for wireless providers to battling online piracy to creatingcybersecurity policy to protecting intellectual property, expect things to heat up in Washington this year. So pour yourself a cup of coffee and read on to ...

Information Ministry hosts cyber workshop
Antigua Observer
ST JOHN'S, Antigua – The Ministry of Information, Broadcasting, Telecommunications, Science and Technology in conjunction with United Alert held a cyber security awareness workshop for several employees, yesterday. The session was facilitated by ...

Senate to debate cyber bills in early 2012
FederalNewsRadio.com
Senate Majority Leader Harry Reid promised to bring up comprehensive cybersecurity legislation early on in 2012. Last year, there were more than 50 bills introduced in Congress, but they received little attention. With the payroll tax cut extension ...

The US Military's New Plan to Deter China
The Atlantic Wire
And then there's cyber security. While there's been much talk in the past about bulking up the US military's defensive cyber security position, the new defense strategy calls advanced offensive cyber security tools, reports Information Week. ...

The Atlantic Wire

SEC staff issues cybersecurity disclosure guidance
Lexology (registration)
2 – Cybersecurity on Oct. 13, 2011. This guidance is intended to provide the views of the SEC's Division of Corporation Finance regarding disclosure obligations relating to cybersecurity risks and cyber incidents. While the statements in this CF ...

5 hot technology policy agenda items you need to watch
ITworld.com
From efforts to furnish wireless providers with the capacity they need to handle an explosion of mobile data traffic to cybersecurity and intellectual property, this year figures to be a noisy year in Washington. But apart from the ever-raucous debates ...

Rapid Fire 2012-01-06 | Defense Strategic Guidance: Wait Till February
Defense Industry Daily
In line with pre-announcements made by his administration in past months, President Obama said yesterday he was directing the Pentagon to lower ground troop levels in favor of increasing special forces, cybersecurity and UAVs, alongside a shift in ...

Charter student wins national competition
WDEL 1150AM
By Mellany Armstrong A Charter School of Wilmington student is being recognized for coming in first in a national cyber-security competition. 15-year-old Gavy Aggarwal of Newark bested more than 2000 participants in the US Cyber Foundations' online ...

WDEL 1150AM

Fieldbus Foundation Extends into Remote Operations Management
ARC Advisory Group
Users also need to pay close attention to both physical and cyber-security for their relatively vulnerable remote operations. Cyber security standards can play an important role here. The US Department of Energy also provides considerable guidance, ...

New Phishing Stats Reveal Criminals Targeted Travel and Credit Card Brands ...
San Francisco Chronicle (press release)
Launched in October 2006 to coincide with National Cyber Security Awareness Month, the site employs a sophisticated voting system that requires the community to vote "phish" or "not phish," reducing the possibility of false positives and improving the ...

The Cyber-Crime Landscape
SYS-CON Media (press release)
We're here now with one of the main speakers, Joseph Menn, Cyber SecurityCorrespondent for the Financial Times and author of Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. Joe has covered security since 1999 ...

SYS-CON Media (press release)

Obama announces a leaner US military
Macleans.ca
Instead, the US will invest in Special Operations forces, cyber-security, and unmanned drones. While focus will shift to Asia, Obama has committed to maintaining a large presence in the Middle East, where tension continues with Iran. ...

Fewer, Better Nuclear Weapons Can Make the U.S. Stronger: View
Bloomberg
... month in an official budget (USBODEFN) request -- the Defense Strategic Review is realistic about trims in force size and retiree costs, and rightly calls for an increased focus on Asia and the Pacific Ocean, counterterrorism and cybersecurity. ...

Former NCTC Director Joins NBC News
mediabistro.com
By Chris Ariens on January 5, 2012 4:30 PM NBC News has brought on former National Counterterrorism Center director Michael Leiter as a counterterrorism, cybersecurity and national security analyst. Leiter will report for all platforms of NBC News and ...

Social Media: The New Battlefront for Cyber Security
Fox Business - VIDEO

Hackers Steal 45000 Facebook Passwords & Logins
ReadWriteWeb
"What was once malware designed to steal data from financial institutions has evolved into a social network threat," says John Weinschenk, CEO at Cybersecurity company Cenzic. "Bank account numbers and Facebook log-in credentials seem very different, ...

DoD spending strategy emphasizes cyberspace
FierceGovernmentIT
5 by President Obama at a Pentagon press conference calls on the Pentagon to, among other things, work with international allies on securing cyberspace and spend on advanced cybersecuritymeasures. The strategy is meant to address how military spending ...

Smart Card Alliance Wraps Up 2011 With Release of the First 'E-Yearbook'
Business Review USA (press release)
PRINCETON JUNCTION, NJ--(Marketwire - Dec 16, 2011) - From the acceleration of EMV and mobile payments to the advancement of open transit payments and cyber security initiatives like the National Strategy for Trusted Identities in Cyberspace (NSTIC), ...

Defense shift could have impact on Colorado bases
Colorado Springs Gazette
Udall said the new strategy's emphasis on cyber security means the Colorado-based Air Force Space Command will play a key role. The command, with headquarters at Peterson Air Force Base in Colorado Springs, is responsible for cyber security in the Air ...

Top 11 Trends For 2012 In Healthcare Data, According To Industry Experts
Dark Reading
With the increased vulnerabilities and as part of a data breach response plan, healthcare organizations will increasingly turn to a cyber security/data breach insurance policy. These top forecasts support the 2011 Benchmark Study on Patient Privacy and ...

INSTANT MBA: Companies Should Forget About Being Good At Everything
Business Insider
Stevens has more than 25 years experience in the Defense and Intelligence industries and has served for seven years as president of MSM Security Services, which created Innoviss, a private cybersecurity firm that specializes in government-related ...

Business Insider

As tech threats grow, so do security firms
Dallas Business Journal
And since then, the cybersecurity and investigations firm has doubled its total headcount and is planning to expand its Dallas office. A big reason for the growth: Attacks on corporate and government data and networks are becoming increasingly ...

Securing cyberspace top priority for 2012
DigitalIDNews
Chief among them are programs such as the Federal ICAM Initiative and National Strategy for Trusted Identities in Cyberspace (NSTIC), which are driving a number of changing cyber security trends. Federal initiatives (eg, NSTIC, FICAM, Federal Trust ...

Eogogics Names Hot Technologies
Techzone360
The technologies are: -4G LTE -5G Wireless -Carrier Ethernet -Cloud Computing -Cyber Security/Warfare -Digital Identities/Privacy -Home Area Networks -Internet Multimedia Subsystem -IPv6 Migration/Implementation -Mobile Backhaul -Presence, Preference, ...

AFCEA/U.S. Naval Institute Defense and IT Conference and Exposition Returns to ...
Sacramento Bee
The TECHEXPO Career fair on January 24 will feature hiring opportunities in Cyber Security, Engineering, Aerospace, Telecom, Project Management, Intelligence, Operations, Homeland Security, Research and more. On January 26, the Military Spouse Career ...

Is the Japanese Govt working with Fujitsu on a cyber weapon?
Government News
The Unites States, China and the United Kingdom have set-up cyber security type of operations to counter any attacks. According to Yomiuri Shimbun Japan's cyber weapon/virus was launched in 2008, by the Defence Ministry's Technical Research and ...

ASIS Middle East Security Conference & Exhibition
SecurityInfoWatch
... maritime piracy, terrorism, executive protection, internal theft and fraud, competitive intelligence, brand protection, physical security, cyber security, investigations, due diligence and global business issues. Practice horizontal learning. ...

Oklahoma spends millions on community college students who drop out, study says
NewsOK.com
For example, the school's cybersecurity program is an especially popular offering among part-time students, she said. But those students often have bachelor's or master's degrees and typically are returning to school for extra training or special ...

WidePoint Corporation Acquires Avalon Global Solutions
PR-CANADA.net (press release)
WidePoint Corporation (NYSE Amex: WYY), a specialist in wireless mobility management andcybersecurity solutions, today announced that it has acquired privately held Avalon Global Solutions, Inc. (AGS), a leading provider of communications lifecycle ...

European Smart Grid Cyber Security 2012 updates: EUROPEAN ...
By noreply@blogger.com (SMi Group Ltd Utilities Division)
EUROPEAN NETWORK FOR CYBER SECURITY. We are pleased to announce and include a new presentation this March from Johan Rambi, Privacy & Security Officer, Alliander on ENCS, Cyber Security for Critical Infrastructure in Europe ...
European Smart Grid Cyber Security...

New Defense Strategy Puts Focus On Cyber Security | SecureWorld ...
By jacob
New Defense Strategy Puts Focus On Cyber Security. By jacob On January 6, 2012 · Leave a Comment · In Uncategorized. The new strategy outlined today calls for investments in cybersecurityto defeat electronic attacks, in expanded space- ...
SecureWorld Post

Cyber Security Awareness: Offline Social Hacking Is Very Dangerous
By Lee
Social engineering has been an activity that has been going on for a long time. Way before computers came on the scene you had social engineering. Social engineering is the ability to get someone to do what you want without them even ...
Security FAQs

NCS 01/06/12 01/06 by nationalcybersecurity | Blog Talk Radio
By nationalcybersecurity
... images by using his computer. Also check out the job of the day. Play in your default player Download this episode Open in new window · Tweet; email; Embed this episode. Tags: hacker,:cyber security,: cyber crime,: computers,: technology ...
Daily Cyber Security News

Raytheon enhances cybersecurity business - UPI.com
Raytheon is enhancing its cybersecurity business for the U.S. military and intelligence community with the acquisition of Henggeler Computer Consultants Inc.
www.upi.com/Business_News/.../UPI-84741325253178/

Obama's defense strategy emphasizes Asia-Pacific, cybersecurity
The new strategy outlined Thursday calls for investments in cybersecurity to defeat electronic attacks, in expanded space-based intelligence platforms and for ...
www.arkansasonline.com/.../obamas-defense-strategy-emphasi...

Raytheon Acquires Cybersecurity and Software Engineering Firm ...
Raytheon Acquires Cybersecurity and Software Engineering Firm Henggeler Computer Consultants PR Newswire GARLAND, Texas, Dec. 29, 2011 GARLAND ...
www.bizjournals.com/prnewswire/press_releases/.../NE28333

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com