Cyber Security and Mobility Highest Priorities for Government

White Paper: Cyber Security and Mobility Highest Priorities for Government
Sacramento Bee
5, 2012 -- /PRNewswire/ -- Lockheed Martin (NYSE: LMT) and its Cyber Security Alliance partners today announced the results of a collaborative cyber security survey in a new white paper titled "Cyber Security and Transformational Technologies – Keeping ...

NBC sites hacked by so-called 'pyknic'; quickly restored; Lady Gaga site also ...
Fox News
WASHINGTON – Several NBC websites were hacked on Sunday by a person or group calling itself "pyknic" and suggesting a possible link to the cyber-attack group Anonymous. It appeared that the "defacement" of the affected sub-sites was ... Anonymous and ...

Email voting in New Jersey could be rife with cyber snafus
The security fears are significant, Stewart said. Malefactors could easily just bombard the email addresses where the votes should go with spam and shut it down, disenfranchising everyone. Stewart preferred another voting option announced for displaced ...


Lancope and Cisco to Present a New Approach for Combating Advanced Cyber ...
Sacramento Bee
Taking place on Thursday, November 8 at 2:00 p.m. ET / 11:00 a.m. PT, the webinar, entitled "A New Approach for Evolving Cyber Threats," will discuss why today's conventional security controls are no longer enough to fend off sophisticated attacks, and ...

NARUC on cyber sec: maintaining vigilance
Intelligent Utility
Intelligent Utility: In an EnergyBiz article (July/Aug 2012) you wrote this past summer, you stated that balancing the state regulators' responsibility for "safe, reliable" electricity with cyber securitymeasures that are "prudent and necessary" is a ...

Cyber response's fatal flaw: mistrust
Federal Times
In case of a major cyber attack on critical networks, experts warn that deep reluctance among the governmental and private-sector organizations to share vital information could blunt a swift response. A number of former high-ranking ... fell victim to ...

NERC-CIP V5 Encourages Unidirectional Gateways
Sacramento Bee
The provisionally-approved CIP V5 standards address a wider spectrum of cyber-securitytechnologies than were addressed in previous versions, and in particular the draft V5 standards address and encourage the use of hardware-enforced Unidirectional ...

IT, HR must collaborate to attract, keep cyber talent
Federal Times
Government agencies are vulnerable points of entry into the nation's critical infrastructure and therefore must vigilantly combat the cyber crisis, which President Obama recently called “one of the most serious economic and national security challenges ...

Napolitano: Practicing Good Cyber Habits a 'Public Education Issue' – Like ...
( – Speaking at a discussion on cybersecurity, Homeland Security Secretary Janet Napolitano said Wednesday that convincing everyone to practice good cyber habits is a “public education issue” like the seat belt campaign in the 1960s.

Lunarline Seeks to Fill Open Positions at UMUC Job Fair
Sacramento Bee
5, 2012 -- ARLINGTON, Va., Nov. 5, 2012 /PRNewswire/ -- Cyber security and privacy company, Lunarline, will be at Call to Serve: Federal and Government Job Fair at the University of Maryland University College (UMUC) on Thursday, November 8. " . . . Tips: Keep a clean machine: Having the latest security software, web browser and operating system are the best defenses against viruses, malware and other online threats. Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.Unique account, unique password: Separate passwords for every account helps thwart cybercriminals. When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email. Get savvy about Wi-Fi hotspots: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your machine. Protect your $: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure. Think before you act: Be wary of communications that implores you to act immediately, offers something that sounds too good to be true, or asks for personal information. Help the authorities fight cybercrime: Report stolen finances or identities and other cybercrime to the Internet Crime Complaint Center ( and to your local law enforcement or state attorney general as appropriate.

Additional Resources:

Better Business Bureau

OnGuardOnline: Shopping Online

U.S. CERT: Shopping Safely Online


cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud