White House cybersecurity official retiring

White House's cybersecurity official retiring
Washington Post
The White House's cybersecurity coordinator said Thursday that he is stepping down at the end of this month after a 2 1 / 2 -year tenure in which the administration has increased its focus oncyber issues but struggled to reach agreement with lawmakers ...

HASC cyber language possible cause for veto
FierceGovernmentIT
... House Armed Services Committee-approved version of the fiscal 2013 national defense authorization act that would permit the secretary of defense to authorize clandestine cyberspace operations and Defense Department networks against a cyber attack.

Schmidt resigns from White House cyber post
Nextgov
The move comes as the administration is at loggerheads with Congress over cybersecurityand the fate of the Cyber Intelligence Sharing and Protection Act (CISPA). In a policy statement released April 25, the Obama administration hammered at CISPA, ...

UK firms confess cyber crime fears
IT PRO
By Caroline Donnelly, 17 May 2012 at 13:28 The recent run of high-profile cyberattacks on private and public sector firms has left many UK companies living in fear that the same could happen to them. This is the view put forward by IT security firm...

IT PRO

Cyber security focus of new US deal
The Australian
AUSTRALIA is set to deepen its co-operation with the US on cyber security, described by government officials and security experts as the "battlefield of the future". Attorney-General Nicola Roxon and US Secretary for Homeland Security Janet Napolitano ...

The Pirate Bay Taken Down by Cyber Attack
eSecurity Planet
By Jeff Goldman | May 16, 2012 The Pirate Bay has been offline for more than 24 hours due to a massive DDoS attack. "The controversial website for torrent downloaders confirmed the attack on its Facebook page, saying 'We don't know who's behind it but ...

eSecurity Planet

White House cyber czar Howard Schmidt to retire
FederalNewsRadio.com
He also served as a cyber adviser under President George W. Bush. President Barack Obama greets White House Cybersecurity Chief Howard Schmidt in the White House in 2009. (Lawrence Jackson/White House) As first reported by the Washington Post, ...

Cyber spies exploiting Java, Flash flaws
CSO
By Antone Gonsalves May 17, 2012 — CSO — Cyber spies have planted Java- and Flash-exploiting malware on Web sites focused on human rights, defense and foreign policy. Over the last two weeks, the Shadowserver Foundation, a nonprofit group that tracks ...

Top White House cybersecurity official retires
The Hill (blog)
But he will retire with the cybersecurity proposal still pending in Congress. The House passed its own cybersecurity bill, the Cyber Intelligence Sharing and Protection Act (CISPA), last month, but the White House has threatened to veto it, ...

Most UK businesses expect cyber attacks to increase
Computing
When asked what would make their board take the business risk of cyber attacks more seriously, 61 per cent of respondents said it would be an attack on their company or a competitor. There also seems to be growing uncertainty among the industry, ...

Computing

Pirate Bay goes offline after DDOS attack by mystery hacker
Daily Mail
By Tom Gardner An illegal file-sharing website has been taken off line after a cyber attack by a mystery hacker. The Pirate Bay, which enables people to download files, music and films without paying, was suddenly bombarded with internet traffic which ...

Daily Mail

White House cybersecurity official stepping down
Reuters
Schmidt will be succeeded by Michael Daniel from the White House Office of Management and Budget where he has worked on cybersecurity and classified intelligence and defense program issues. General Keith Alexander, head of US Cyber Command, ...

AusCERT 2012: US Army Cyber Command has never seen a cyber attack
CSO Magazine
The US Government, like most others, is openly building up offensive 'cyber' capabilities, but the arms race is on before the world has even seen a real cyber attack, says Robert Clark, operational attorney for the US Army Cyber Command.

Cyber security mechanism soon: NSA
Hindustan Times
National Security Advisor (NSA) Shiv Shankar Menon on Wednesday said the government is in the final stages of preparing a 'whole of government' cyber security architecture. Challenges, Menon said during the 2010 Commonwealth Games in Delhi, ...

Remember Stuxnet? Why the U.S. is Still Vulnerable
ProPublica
The Department of Homeland Security revealed a rash of cyber attacks on natural gas pipeline companies last week. (Mike Nelson/AFP/Getty Images) Last week, the Department of Homeland Security revealed a rash of cyber attacks on natural gas pipeline ...

ProPublica

Cyber attack could prompt NATO action: UK minister
Zee News
London: Britain's armed forces minister says that a cyber attack aimed at a NATO member could mobilise the alliance to act against an aggressor. Nick Harvey told UK lawmakers today that NATO's Article 5 could be invoked in the case of a cyberattack ...

Zee News

The Pirate Bay Disabled by DDoS Cyber-Attack
Infopackets
Now, the controversial site is facing an even bigger threat: a special type of web-based attackhas disabled the site altogether. According to recent reports, The Pirate Bay was completely disabled and inaccessible for more than a day after it was ...

HP, CSC and EMC open cyber-security research centre
Consumer Tech
The CDC will be used to demonstrate different attacks on its IT infrastructure, with the aim of developing new cyber-attack defences for the security industry to take up. "The base for trust, data protection and security are constantly changing.

Consumer Tech

US joins cyber forces with Australia
FederalNewsRadio.com
The United States has a new partner in the global fight against cyber attacks. Australia's attorney general, Nicola Roxon, signed a bilateral agreement with Homeland Security Secretary Janet Napolitano in Washington on Wednesday.

Govt to finalise cyber attack protection
Jagran Post
Releasing an IDSA report on cyber security, he said here that the same technology has enhanced the internal security capabilities through cyberpenetration and a "democratic society must draw a line between the collective right to security and the ...

Jagran Post

Department of Homeland Security Issues Warning on Medical Device Threats
CIO Insight
By CIOinsight Medical devices and smartphones can expose patient data and also lead tocyber-security problems, the Department of Homeland Security warned. The US Department of Homeland Security has issued a warning about the role of medical devices in ...

White House cyber czar Howard Schmidt to step down
FCW.com
By FCW Staff Howard Schmidt, the White House cybersecurity coordinator, is stepping down after serving two and a half years. Schmidt made the announcement May 17, saying he's retiring in the end of May to spend more time with his family and to pursue ...

iPhone, iPad become apple of cyber criminals' eye
Network World
By Taylor Armerding, CSO Apple devices -- ever more popular in the workplace -- are about to become more popular with cyber criminals. That is one of a number of findings in securityvendor Zscaler's Q1 State of the Web Report that should be unsettling ...

Obama Cybersecurity Coordinator Resigns
BankInfoSecurity.com
Keith Alexander, who heads the National Security Agency and military cybercommand, says the cybersecurity coordinator-designate has been an influential voice in cybersecurity within the executive branch. "He understands the challenges that are facing ...

BankInfoSecurity.com

SAIC Recognized as 2012 SmartCEO VOLT Leader in Technology
Sacramento Bee
Running a scoring cycle every minute and presenting students or competitors performance in a variety of charts and graphs, CyberNEXS trains users in the key cyber security skills of cyberdefense, penetration testing and forensics analysis.

Top Executives in Critical Infrastructure Cite Need for Improvement in ...
Sacramento Bee
By EMC Corporation RSA, The Security Division of EMC (NYSE: EMC), alongside Carnegie Mellon CyLab highlight Carnegie Mellon CyLab's new 2012 Governance Report, the first global analysis of how boards and senior executives are managing cyber risks by ...

HP Marketing Manager Emphasises Cyber Security Protection
ITProPortal
HP DVLabs security product marketing manager, Jennifer Lake, walks us through the company's 2011 Cyber Security Risk Report, which features attack data and analysis. Lake, who focusses on enterprise security, discusses the persistent security risks in ...

What Isn't Cyber War, Healthcare Vulnerabilities, and More
SYS-CON Media (press release) (blog)
By Bob Gourley US Army Cyber Command operational attorney Robert Clark said that the legal frameworks are not keeping pace with cyber operations and said that claims of “cyber war” do not qualify as war defined by international laws of armed conflicts.

White House Cyber Czar Schmidt to Retire | FedScoop
By David Stegon
He previously worked in public service as a cybersecurity adviser under President George W. Bush and served as chief security strategist for the U.S. CERT Partners Program for the NationalCyber Security Division through Carnegie Mellon University, in support of the ... Before Microsoft, Mr. Schmidt was a supervisory special agent and director of the Air Force Office of Special Investigations (AFOSI) Computer Forensics Lab and Computer Crime and Information WarfareDivision.
FedScoop

India creates "coherent and comprehensive" security policy to ...
By Manzar Chaudhury
To deal with the "anarchic new world of undeclared cyber threats, attack” India is going to create a "coherent and comprehensive" security...
Latest Digitals

Albania and Romania rehearsals and a cyber attack.
By akoe07
Ok it appears that a number of popular Eurovision web sites have been or are under attack by hackers. Esctoday is down completely and Eurovision.az the local website also. ESCKaz is also having problems as is EscInsight. We are led to ...
All Kinds Of Everything for Eurovision

Australian Cyber Expert Proposes Cyber Militia « To Inform is to ...
By Joel Harding
For years members of the cyber world have toyed around with the phrase “Wild West”, many in authority resisting use of that term because we have laws for many situations. ... from → cyber security, Cybersecurity, Information operations ...
To Inform is to Influence

India is creating a comprehensive security policy to deal with cyber ...
By anoop
National Security Adviser Shivshankar Menon has said that in order to deal with myriad cyberthreats, India is creating a “coherent and comprehensive” security policy. ... of putting in place the capabilities and the systems in India that will enable us deal with this anarchic new world of constant and undeclared cyber threat, attack, counter-attack and defence,” he said at the release of a report on “India's Cyber Security Challenge” by the Institute of Defence Studies and Analyses (IDSA).
eGov Magazine

Debian GNU/Linux 6.0.5 Released ~ VOGH- VOICE OF GREYHAT ...
By VOGH Reporter
VOGH- VOICE OF GREYHAT| Leading Resource of Cyber-Security & Hacking News. VOGH-News ... Pirate Bay Criticize Anonymous. TPB Criticize Anonymous DDoS Attack on Virgin Media... Ministry of Defence (MoD) Under Cyber Attack ...
VOGH- VOICE OF GREYHAT| Leading...

CISPA Letters « The Burning Platform
By Wyoming Mike
The bill ensures that such intelligence is only: (1) shared with certified entities or a person with an appropriate security clearance; (2) shared consistent with the need to protect U.S. nationalsecurity; and (3) used in a manner that protects such ... Importantly, I voted for an amendment that limited the federal government's ability to share cyber-threat information for only the following purposes: 1) cybersecurity; 2) investigation and prosecution of cybersecurity crimes; 3) protection of ...
The Burning Platform

The Blog @ Homeland Security: Enhancing cybersecurity ...
By Homeland Security Blog Team
This statement of intent will help enhance situational awareness and information sharing on cybersecurity issues, increase collaboration and sharing of cybersecurity best practices, and create opportunities for training and cooperation in cyber ...
The Blog @ Homeland Security

Hackers for hire put corporate security systems to
The pair from California State University-Pomona were hired after they aced a cyber-securitycompetition held by Boeing, in which the aerospace giant urged students to consider careers incyber security and, of course, scouted for fresh talent. As computer threats become more coordinated and ... more on simulated cyber battlefields than in classrooms. “As long as there are computers, there will be somebody trying to attack them,” said Sims, adding that teamwork at the office pays off.
Nashuatelegraph.com: Business...

NGO Committee on the Status of Women, Geneva » Blog Archive ...
By webadmin
Panelists raised questions about when a cyber-operation amounts to an attack on a state, and when it becomes a national security threat. But more importantly the question of when would these attacks fall under United Nation Laws regarding armed conflicts and warfare must be addressed. The speakers called for a code of conduct which would include a focus on education, defining the legal and international frameworks, and a focus on the private/public partnership, and it would be ...
NGO Committee on the Status of...

DoD Buzz | CSAF, CNO attempt to demystify Air-Sea Battle
By Philip Ewing
... gave an example that made hacks' and audience members' eyes pop: Why not use a submarine to suppress an adversary's air defenses, and why couldn't it do so without a cruise missile — say, electronic countermeasures or cyber-attack? ... Schwartz acknowledged that for most of the modern era of warfare, the U.S. could use space almost with impunity, but it's going to be a “contested domain,” if it isn't one already, and that threat could ruin all those PowerPoint slides in which ...
DoD Buzz

America's First Cyber Czar Howard Schmidt Set to Retire ...
By Steve Ragan
... the Obama Administration named Howard Schmidt as the White House CybersecurityCoordinator. After more than forty years in the IT community, the former head of the InformationSecurity Forum and the nation's first cyber czar will retire at ...
SecurityWeek RSS Feed

The Hot Topic at the Cloud Computing Conference in Tel Aviv ...
By Yaron Azerual
I was able to discern the hot issue for the attendee base: security. The reason was clear as a prominent website suffered a highly publicized series of cyber attacks just prior to the convention. Why fortuitous you ask? It gave me the chance to ... During the attack, the neighboring website receives a massive amount of traffic, which overloads its infrastructure resources and takes it down; this includes the application, the server and the ADC in front of it. Now, even if the cloud provider has ...
Radware Blog

Americans More Worried About Cybersecurity Than Terrorism ...
Yep and it comes from some unique sources, one being the new COD Black Ops 2 has a focus of 'cyber security' basically talking about how terrorists are going ...
politics.slashdot.org/.../americans-more-worried-about-cyberse...

NSA not to disclose communications after cyber attack - WSMV ...
(CNN) – The National Security Agency does not have to release any information on internal communications it had with Google after a cyber attack in China two ...
www.wsmv.com/.../nsa-not-to-disclose-communications-after-...

April 2012 Cyber Attacks Statistics « Hackmageddon.com
As far as the Motivations Behind Attacks are concerned, Cyber Crime ranks undoubtedly at number one with the 51% of the occurrences. Hacktivism is at ...
hackmageddon.com/2012/.../april-2012-cyber-attacks-statistics...

Taking An Adversarial Approach in Cybersecurity - M-unition ...
From a cybersecurity perspective, a key question organizations face is whether they should focus on reactively protecting assets from the bad guys, or to take a ...
https://blog.mandiant.com/archives/2613

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com