Peter G. Neumann on Cyber Security (video)



Computer scientist Peter G. Neumann talks about his research to create more secure software and hardware.

Cyber hacking demo previews next week's GEO Huntsville conference
al.com (blog)
The conference is one of three economic development initiatives from the mayor's office, with the other two focusing on energy conservation and cyber security. ... "We went through exactly what would happen in a cyber attack," Battle said. "You lose ...

al.com (blog)

Cyber attack puts IDs of 3.6M South Carolinians at risk
Charleston Regional Business
About 3.6 million Social Security numbers and 387,000 credit and debit card numbers on file at the S.C. Department of Revenue have been exposed in a cyber attack launched from outside the United States. The state agency said that the vast majority of ...

Distributed denial-of-service mitigation key to dealing with cyber attacks: Report
Business Insurance
... a cyber attack this holiday season include having a single source for distributed denial-of-service mitigation services and making distributed denial of service a part of firms' disaster recovery plans, says a cyber security firm in a white paper ...

Cyber warriors training hard to defeat adversaries, Army cyber leaders said at ...
Defense Systems
"In cyberspace, the significant advantage will go to the side that can protect and secure critical information as well as gain and exploit advantages.” Commanders across the military are buildingcyber into training exercises. For example, Army cyber ...

The Next Weapon Of Mass Destruction Will Probably Be A Thumbdrive
Business Insider
based think tank that focuses on Asian security issues, concluded that groups operating from Chinese territory have been “waging a coordinated cyber espionage campaign targeting U.S. government, industrial, and think tank computer networks.” ... Which ...

Cyber security at US energy agency found wanting
ComputerWeekly.com
Cyber security at the US government's largest renewable power transmission agency has been found wanting by an Energy Department inspector general. The Western Area Power Administration (WAPA), which sells and transmits power through 17,000 ...

Japan vulnerable to cyber-attack
Times of India
While the government is hurrying to set up organizations to counter internet-based attacks, the nation remains vulnerable due to a lack of sufficient numbers of cyber security specialists and effective systems and infrastructure to prevent security ...

South Carolina governor seeks to calm taxpayers after security breach
Chicago Tribune
CHARLESTON, South Carolina (Reuters) - South Carolina Governor Nikki Haley sought on Monday to temper the anger and frustration of state taxpayers left wondering if their personal information was compromised by recent cyber attacks on computers ...

DHS Awards 34 Cyber Research and Development Contracts
Signal Magazine
The Department of Homeland Security Science and Technology Directorate (DHS S&T) has awarded 34 contracts to 29 academic and research organizations for research and development of solutions tocyber security challenges. The contracts were ...

US is source of cyber terrorism: Iranian defense minister
Tehran Times
“The United States is the source of cyber terrorism and intends to pave the way for increasing its activities in relation to cyber terrorism through diverting attention and leveling accusation,” Vahidi said on Monday in response to U.S. Defense ...

ISC Diary | Cyber Security Awareness Month - Day 26 - Attackers ...
Here on Day 26 of Cyber Security Awareness Month, as the ISC focuses on standards, we received a very interesting email from David at Lamp Post Group, the ...
isc.sans.edu/diary.html?storyid=14395&rss


cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com