Items Tagged with "Cyber Security"


69dafe8b58066478aea48f3d0f384820

Obama Delivers Cybersecurity Strategy to Congress

May 12, 2011 Added by:Headlines

“We are now in a world in which cyber warfare is very real. It could threaten our grid system. It could threaten our financial system. It could paralyze this country, and I think that's an area we have to pay a lot more attention to..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Experts Launch Cybersecurity Index Resource

May 10, 2011 Added by:Headlines

The Index of Cyber Security is a measure of the risk to the corporate, industrial, and governmental information infrastructure. It is sentiment-based in recognition of the rapid change in cybersecurity threats and the state of cybersecurity metrics as a practical art...

Comments  (0)

F520f65cba281c31e29c857faa651872

Chinese Hackers Are Hungry for Information

May 06, 2011 Added by:Rahul Neel Mani

Stuart McClure, Senior Vice President at McAfee co-authored his best-selling book Hacking Exposed: Network Security Secrets & Solutions 12 years ago. In an interview with Varun Aggarwal, he talks about how things have changed since then as he launched the new edition of his book...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DOJ: FBI Unprepared to Combat Cyber Security Threats

April 28, 2011 Added by:Headlines

"One agent who had recently been assigned his first counterterrorism intrusion case said that he did not know how to investigate a national security intrusion case. He was concerned about is ability to perform the investigation, especially because he viewed it as a significant case..."

Comments  (3)

69dafe8b58066478aea48f3d0f384820

White House Official: Attacks are Risk of Doing Business

April 28, 2011 Added by:Headlines

In the wake of several substantial consumer information breaches such as those at Sony and Epsilon, White House cybersecurity coordinator Howard Schmidt sought to downplay the level of concern in stating that cybersecurity events are simply a business-side risk like any other...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Joint US - Russian Report on Critical Cyber Terms Released

April 27, 2011 Added by:Headlines

“It may seem like a small step, but Russians and Americans have never before sat down and really agreed on the terms that are the prerequisite for rules of the road for cyber conflict. Defining terms together is the first step for creating international cybersecurity agreements...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Security Lacking for Critical Infrastructure Systems

April 19, 2011 Added by:Headlines

"The message is that our industrial control systems are very, very vulnerable to attack and the security we have installed today is insufficient to protect us. I'm concerned that (the industry) is not getting that message, despite having the evidence in front of us..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senators Introduce Cyber Security Public Awareness Act

April 18, 2011 Added by:Headlines

“The government keeps the damage we are sustaining from cyber attacks secret because it is classified. The private sector keeps the damage they are sustaining from cyber attacks secret so as not to look bad... The net result of that is that the American public gets left in the dark..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Outlines Strategy for Trusted Identities in Cyberspace

April 18, 2011 Added by:Headlines

This is NOT a government-mandated, national ID program; in fact, it's not an identity 'program' at all. This is a call by the administration to the private sector to step up, take leadership of this effort and provide the innovation to implement a privacy-enhancing, trusted system...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Panel to Examine Cyber Security Supply Chain Issues

April 14, 2011 Added by:Marjorie Morgan

Economics are driving both industry and government to adopt increasingly sophisticated technologies which raise serious new security issues. It is simply dangerous to suggest that the problems can be managed with a set of government determined technical standards...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

DHS Concerned About Cyber Security Budget Cuts

April 14, 2011 Added by:Headlines

"I don't want to tell you that the sky is falling... But I'm telling you that the threat environment is significant, and it is not possible for anyone to stay completely secure. It's just too hard, even for the most concerned agencies or private-sector entities..."

Comments  (0)

7ce032c184c593a533f07004162c53bb

The Cone of Destruction

April 12, 2011 Added by:Carter Schoenberg

Americans maintain a culture of “get it done in two weeks or it has no value”. Odd that its not training, not more ammunition (antivirus), not better firearms (IDS/IPS), but a change in our culture regarding security and technology that will save us from our own cone of destruction...

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

A Potential Silver Lining in a Government Shutdown

April 08, 2011 Added by:Wayde York

Threats that exploit our systems and target specific information work in the background in a "low and slow" method, and finding them in the din of normal network traffic is difficult. If the shutdown does occur, the layers of noise that protects these threats will be pulled back...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Government Shutdown Could Impact Cyber Security

April 07, 2011 Added by:Headlines

"When we put ourselves in state of chaos like this, and this is what it will be, think of the opportunities for striking through the APTs (advanced persistent threats), they can pick and choose the targets with much less security behind them..."

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch National Cyber Security Strategy - Blessing or Curse?

March 31, 2011 Added by:Don Eijndhoven

For now, very few experts take these measures seriously and fear that our National cyber defense posture will be weakened rather than strengthened. Let´s hope that this is not the case, because various research papers already point to The Netherlands as a haven for malware...

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

Security Vendors Vow to Defend Against Cyber-Boogeyman

March 21, 2011 Added by:J. Oquendo

McAfee is making a run to become the security industry's "Minitru". Regardless of my view of the security landscape, I believe that there is an increasing need to share information between companies that are under attack or that have been compromised. However, I doubt this could ever happen...

Comments  (4)

Page « < 19 - 20 - 21 - 22 - 23 > »