Blog Posts Tagged with "Cyber Security"
July 09, 2011 Added by:Pete Herzog
The points made in this article reflect the research findings outlined in the OSSTMM 3: operational security controls, security and trust metrics, and the Moebius Defense security model where environmental protection precedes security awareness. You can find OSSTMM research at the ISECOM website...
July 07, 2011 Added by:Headlines
The first step to international agreements are bilateral and multilateral dialogues. Earlier this year, EWI-led U.S.-Russia talks on “rules of the road” for cyber conflict produced an attention-getting report, and a team of U.S. and Chinese experts published joint recommendations on reducing spam...
July 04, 2011 Added by:Don Eijndhoven
Though it is positive that the Cyber Security Council was made operational so quick, it is sad that the Dutch government did not provide a course for others to participate. Obviously the first batch of members have been hand-picked - it could hardly be called a democratic process...
June 28, 2011 Added by:Headlines
"Virtually everybody gets breached. If you're going to have these advanced persistent threat guys come after you, they're going to get into your system. If you're going to make that the line, and then you're subject to these name-and-shame penalties, I think that would be a mistake..."
June 23, 2011 Added by:Headlines
ISA has articulated its pro-market approach to cyber security through the two editions of its “Cyber Security Social Contract.” When the Obama Administration released its own policy paper for cyber security, the Cyberspace Policy Review, the first document it quoted was the ISA Social Contract...
June 22, 2011 Added by:Jay Bavisi
We need to identify what is a best practice using currently available standards, and build a framework that allows us to follow this “code of conduct” in an automated way that provides a continuous flow of security, and can pinpoint failures in our security policies in real time...
June 14, 2011 Added by:Headlines
“The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems. It is going to take both defensive measures as well as aggressive measures to deal with it..."
June 09, 2011 Added by:Headlines
"A key role for government is to assist industry in developing these voluntary codes of conduct. These codes of conduct should aim to unify various technical standards that currently exist and identify a broad set of responsibilities that industry members can use as a baseline..."
June 02, 2011 Added by:J. Oquendo
When it comes to mission critical, sensitive information, why are government officials using anything outside of vetted networks, connections, and / or software. This is not only puzzling but borders on outright stupidity and negligence...
June 02, 2011 Added by:Headlines
“I’d like to see us create a working group which talks about cybersecurity espionage and cyber conflict in a big way. Cybersecurity is now intertwined with international security, and you can't divorce it from that...”
May 27, 2011 Added by:Headlines
"In a time when most can only see a grim, downward spiral of recrimination when it comes to all things cyber, this report is the product of cooperation and offers some hope for an improved relationship between China and the US..."
May 24, 2011 Added by:Headlines
The debate in the U.S. over legislating an "Internet kill switch" is not one of whether or not to create a mechanism to control Internet access, but one of who will legally exercise the power to limit accessibility and under what circumstances...
May 20, 2011 Added by:Headlines
"Overall, the proposals are disappointing compared with what the president said in his 2009 policy statement... [and] when you look at some sections, it appears to give DHS some broad authorities here that concern us." said Larry Clinton, president of the Internet Security Alliance...
May 19, 2011 Added by:Headlines
"Unless people really start to really pay attention to the threat and how we need to drive fundamental change, we're in a world that is going get worse from day to day and month to month and year to year," Reitinger stated...
May 17, 2011 Added by:Headlines
"Cyberspace activities can have effects extending beyond networks; such events may require responses in self-defense. Likewise, interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders..."
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013