Blog Posts Tagged with "Cyber Security"


Smart Cities Must Be Secure Cities

April 14, 2017 Added by:Jack Huffard

The time spent to get the security of smart cities right out of the gate will save taxpayers significant sums in the future by not having to compensate for security issues later.

Comments  (0)


Securing Executive Buy In as the Cyber Security Threat Landscape Expands

December 16, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives — especially those not directly involved with deploying security programs — to fully participate and contribute on a continuous basis.

Comments  (0)


A View from the Top: The C-Suite Steps Up as Cyber Security Threats Surge

July 13, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives—especially those not directly involved with deploying security programs—to fully participate and contribute on a continuous basis.

Comments  (0)


House Subcommittee Passes Legislation to Protect Critical Infrastructure

January 21, 2014 Added by:Anthony M. Freed

The House of Representatives Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies has passed a bill to bolster provisions to protect the nation’s critical infrastructure, moving it one step closure to full consideration.

Comments  (0)


The Interim Years of Cyberspace - The Quick(er) Version

January 15, 2013 Added by:Robert M. Lee

A quick(er) look at the publication: "The Interim Years of Cyberspace." The publication was intended for a military audience but this post tries to apply some of those lessons and thesis points to the larger InfoSec community...

Comments  (0)


The "January Effect" - An Annual Phenomenon Since 2009

December 16, 2012 Added by:Jeffrey Carr

A phenomenon that I've noticed each year since 2009 - a major breach or act of cyber warfare that kicks off the New Year. It may start in December and then get publicized in January, or happen in January and get publicized a bit later but it has happened four years in a row now so I fully expect it to occur once again...

Comments  (1)


The Four Horsemen of the Cyber-Apocalypse: Security Software FUD

December 15, 2012 Added by:Tripwire Inc

Did the title of this post get your attention? We are doomed! The sky is falling! All of your computers are infected! We are just one security breach away from complete human extinction! The security software industry is guilty of overhyping cyber threats to sell their products, second only to Hollywood...

Comments  (1)


Sophos Security Threat Report 2013, today... tomorrow

December 07, 2012 Added by:Pierluigi Paganini

Sophos was one of the first security firms that has published a report on the security landscape the upcoming year. The document provides an interesting overview on most common and dangerous cyber threats to determine the level of penetration in different countries...

Comments  (0)


Our Massively Dysfunctional Cyber System

November 28, 2012 Added by:Joel Harding

What should be done to stop theft of intellectual property by state actors (China) would require a Presidential Finding but our leadership structure is devoid of real leaders. That is not a political statement, that is a statement about our country...

Comments  (0)


European Commission supports research on Cyber security

November 28, 2012 Added by:Pierluigi Paganini

Cyber security is considered a primary target for every governments, the increase of cyber criminal activities, state-sponsored operations and the rise of hacktivism requires the use of additional resources to counteract these phenomena...

Comments  (0)


Four Turning Points in Cybersecurity History

November 18, 2012 Added by:Tripwire Inc

Enterprises adopted reputable standards for secure configurations, and implemented repeatable practices for creating secure infrastructure. This shift dramatically reduced the attack surface of enterprises, greatly increasing the difficulty of achieving a successful attack...

Comments  (0)


Joining hands against cybercrime in Africa

November 08, 2012 Added by:Pierluigi Paganini

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...

Comments  (0)


US Cyber Security Direction

November 07, 2012 Added by:Jayson Wylie

President Obama stated an Executive Order to be instilled which may be in a better direction but nothing definitive or out yet nor am I expecting a solid direction or hitting upon the finer notes in the short term. Let’s not kid ourselves. Having a point-of-presence on the Internet is dangerous...

Comments  (0)


Industrial Control System Security: A Reliability Issue?

November 06, 2012 Added by:Larry Karisny

Cyber Security Expert Joe Weiss has spearheaded the ICS Cyber Security Conference for 12 years and when he calls in the troops, the best come to serve. Last month’s conference held at Old Dominion University's Virginia Modeling Analysis and Simulation Center -- VMASC in Suffolk, Va. -- was no different...

Comments  (1)


Cybersecurity Matters in The Election

November 05, 2012 Added by:Robert Siciliano

Whomever is elected president will face an unknown unseen digital enemy unlike any other president has seen in history. Think before you click. Know who’s on the other side of that instant message. What you say or do in cyberspace stays in cyberspace — for many to see, steal and use against you or your government...

Comments  (0)


Canada´s audit on cyber threats to national critical infrastructure

October 25, 2012 Added by:Stefano Mele

The Office of the Auditor General of the Canada revealed in an audit made public October 23 that "the cyber threat environment is evolving more rapidly than the Canada government´s ability to keep pace"...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »