Items Tagged with "Cyber Security"


69dafe8b58066478aea48f3d0f384820

U.S. Engages NATO and E.U. in Cyber Defense Talks

January 24, 2011 Added by:Headlines

"It’s an opportunity for Deputy Secretary Lynn to meet and discuss with NATO and EU leaders ways to strengthen cybersecurity and to follow through on the Lisbon Summit declaration to develop and implement a NATO cyber policy and implementation plan with real capabilities..."

Comments  (0)

23ce88322d3298cbfac813448612a1c9

More than 88 Lines About Less than 44 Weeks in Infosec

January 21, 2011 Added by:Mark Evertz

It's a never ending journey that unearths painful truths, nerve-wracking challenges to your beliefs and confidence, and it keeps it's clutches in you with the lure of fighting the good fight or making an obscene amount of money and wreaking havoc on the world if you're donning the black hat...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Federal Cyber Security and Executive Mobility

January 17, 2011 Added by:Jon Stout

As the Federal Government grows larger and larger, the vulnerability to cyber attack of its agency systems grows geometrically. And, since the entire network of diverse agencies and users is becoming more integrated, multiple access points open the entire system to attack...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon Fails to Disclose Covert Cyber Ops

January 13, 2011 Added by:Headlines

A classified report on military operations provided to Congress by he Pentagon failed to disclose the military's use of cyber-based operations. The Pentagon's Michael Vickers, replied by questioning whether or not cyber ops are covered by the law that dictates what should be covered in the reports...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Security Alliance to Present at RSA Conference

January 10, 2011 Added by:Headlines

ISA will present on "How to Assess the Financial Impact of Cyber Risk" at the RSA conference. ISA’s mission is to integrate advanced technology with the realistic business needs of its members and enlightened public policy to create a sustained system of cyber security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Building Billion Dollar Cyber Security Facility

January 10, 2011 Added by:Headlines

There is a clear mandate for a public-private partnership - led on the government side by DHS - but supported by all elements of the U.S. government, to include federal, state and local organizations represented here today...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

CyberForensics: Understanding Infosec Investigations

January 06, 2011 Added by:Ben Rothke

The book takes a broad look at cyberforensics with various case studies. Each of the books 10 chapters takes a different approach to the topic, and is meant to be a source guide to the core ideas on cyberforensics...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Upcoming Events at the Internet Security Alliance

January 04, 2011 Added by:Headlines

ISA is a unique multi-sector trade association which provides thought leadership and strong public policy advocacy. ISA’s mission is to integrate advanced technology with the realistic business needs of its members and enlightened public policy to create a sustained system of cyber security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The U.N. and Government Control of the Internet

December 30, 2010 Added by:Headlines

"We have to be careful about what institutions take the lead. The Chinas, the Irans, the Saudi Arabias of the world want to impose a territorial vision of control over cyberspace -- and if the ITU got its wishes, that's essentially what would happen..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

National Defense Authorization Act Omits Cybersecurity

December 22, 2010 Added by:Headlines

The omitted language includes the creation of White House based office to coordinate cybersecurity efforts and the creation of a Federal Cybersecurity Practice Board to enforce Federal Information Security Management Act compliance and implementation of NIST recommendations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Asserts Agency's Leading Role in Cyber Security

December 21, 2010 Added by:Headlines

Cyberspace is fundamentally a civilian space. There are some who say cybersecurity should be left to the market, and there are some who characterize the Internet as a battlefield. Both the market and the battlefield analogies are the wrong ones to use...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Making the Case for State-Sponsored Cyber Warfare

December 19, 2010 Added by:Headlines

Richard Stiennon's latest publication, Surviving Cyberwar, presents a decisive case study and evidence that the specter of cyberwarfare is not merely theory, but is in fact actively being employed as a strategy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US and EU Partner on Cyber Wargames and Security Plans

November 24, 2010 Added by:Headlines

The US and EU recently conducted cyber wargames, and have announced plans to cooperate on addressing a range of cyber security issues. The security exercises included participants from the private sector, and were focused on coordinated responses to cyber-related threat scenarios...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Government is Headhunting Cyber Warriors

November 20, 2010 Added by:Headlines

Even if there were a systemic change in the way of we prepare kids for technology careers, the US would still be a generation behind nations in Asia and Europe. The result could be the loss of our competitive edge in the marketplace, and result in the loss of our status a cyber superpower...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Creating a Cyber Defense Team Part Two

November 16, 2010 Added by:Richard Stiennon

Banks, long the target of cyber crime, and casinos, with vast experience fighting insider threats, have had this type of interaction with their peers for years. It is time for manufacturers, non-profits, universities, state and local governments to do the same...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Google Ordered to Produce Name of Cyberstalker

November 15, 2010 Added by:Robert Siciliano

Information Week reports that a New York judge has ordered Google to reveal the identity of a cyberstalker who has anonymously posted video and messages on the Internet. The videos included sexual slurs and damaging information that could affect the woman’s reputation and career...

Comments  (0)

Page « < 21 - 22 - 23 - 24 - 25 > »