Blog Posts Tagged with "Cyber Security"


The Case for a Security Consultant Guild

September 27, 2010 Added by:Danny Lieberman

The problem with ISC2 and similar industry lobbies is that they have vested interests, therefore they don't or can't represent independent security consultants. When was the last time Raytheon called me up asking to collaborate on a data security project for DoD? like never...

Comments  (4)


CYBERCOM and Intelligence Community Jobs

September 07, 2010 Added by:Jon Stout

The new CYBERCOM, as a military and intelligence organization should approach the issue of Cyber Terrorism as a military campaign rather that a criminal action. Offensive Cyber operations and counter strikes will be approached with military precision like any other military campaign...

Comments  (0)


Intelligence and Cyber Command Job Opportunities

August 31, 2010 Added by:Jon Stout

The Cyber Command reorganization and consolidation creates significant employment opportunities for Cyber Security professionals and has the potential to allow for more rapid facilitation of high level security clearances. Training and certification is now a mandatory requirement for employment...

Comments  (0)


Cybersecurity: Free Markets versus Centralized Control

August 25, 2010 Added by:Anthony M. Freed

Will the free market conquer the eminent threat to information systems security, or will the free market be overwhelmed by government intercession, ultimately diminishing once free societies to the level of quasi-totalitarianism? The trend is indicative of a movement towards centralized control...

Comments  (0)


Yet Another Proposed Federal Data Security Bill

August 18, 2010 Added by:David Navetta

Many of us have watched over the past few years as dozens of proposed federal data security and breach notification bills have been introduced, often with bipartisan support, but have failed to become law. This year has seen many of the usual proposals...

Comments  (0)


US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)


Vulnerability Management: The Changing Nature of Attacks

July 27, 2010 Added by:Jon Stout

Cyber terrorism, in addition to attacks on corporate networks, poses a direct threat to the U.S. military, civilian agencies and critical infrastructure. Because of the problems with attributing the attacks to the actual source, this threat has become difficult to contain...

Comments  (1)


NPR Report Warns of Cyberdefense Shortage

July 23, 2010 Added by:Global Knowledge

James Gosler, who worked at the CIA, the National Security Agency and the Energy Department, estimates that there are only 1,000 or so people in the United States who have the skills necessary to meet our computer security needs. Quite a deficit, no?

Comments  (5)


NSA Launches Perfect Citizen

July 10, 2010 Added by:Lee Mangold

There's been a lot of talk on the Island about the cyberwar term and this is yet another example: The Wall Street Journal reported that the NSA allegedly awarded a contract to Raytheon for an Information Security program called Perfect Citizen...

Comments  (11)


New Federal Cyber Security Work Group

June 23, 2010 Added by:Richard Stiennon

A few weeks ago I participated in a cyber roundtable pulled together in Washington DC. This was, in part, a meeting to kick off a new organization that will seek to bring security technologists and policy makers together.  (Much more on this at a later date). 

Comments  (0)


ISAlliance Priority Projects for 2010

June 22, 2010 Added by:Marjorie Morgan

In conjunction with the American National Standards Institute (ANSI), ISA published its first handbook for enterprises which examines corporate cyber security from an economic perspective as much as the technical one.

Comments  (0)


Is the U.S. prepared for cyber war or are we sitting ducks?

June 17, 2010 Added by:Ron Lepofsky

Last night Pres Obama made a  speech  to the nation about the BP oil spill.  One of his three central points dealt with preventing a future oil spill disaster.  Today the President  told BP to allocate billions of dollars to reimburse those who suffered as the result of BP’s oil spill. Perhaps now is the time to take similar action and allocate funds and sticks to pr...

Comments  (0)


Cyberwar Debate Rages On

June 16, 2010 Added by:Richard Stiennon

In 2001 Ralph Bendrath, a German cyber security writer and researcher, wrote a report that dug into the efficacy of the use of the term cyberwar. His report is remarkable in that most of what he covers ten years ago represents today’s state of affairs.

Comments  (0)


Surviving Cyberwar Published

June 15, 2010 Added by:Richard Stiennon

After a five month period of editing, indexing, and finally printing, Surviving Cyberwar has been published by Government Institutes, an imprint of Scarecrow Press, a division of the Rowman and Littlefield company.

Comments  (0)


No Internet Kill Switch is No Guarantee

June 13, 2010 Added by:Anthony M. Freed

In continued efforts to centralize the cybersecurity authority within the White House, more than 40 bills have been introduced that will dramatically alter the balance of power between the government and the private sector. Protecting Cyberspace as a National Asset Act of 2010 will shift the responsibility of federal agency cybersecurity from the Office of Management and Budget (OMB) to DHS by cre...

Comments  (3)


Don't Ask..Don't Yell

June 07, 2010 Added by:Ron Baklarz

In case you have not been following the current slew of cyber security-related legislation that has been penned during the 111th Congress, there are currently 35 different laws in various stages of the legislative process.  Melissa Hathaway, former White House cyber security advisor, has recently released a study of these legislations

Comments  (0)

Page « < 19 - 20 - 21 - 22 - 23 > »