Items Tagged with "Cyber Security"


69dafe8b58066478aea48f3d0f384820

US Officials Overwhelmed By Cyber Defense Problem

November 13, 2010 Added by:Headlines

Further obstacles to innovation are inherent in the legislative process, with a plethora of competing cyber security bills being offered for consideration. Legislation is a slow and cumbersome process, and results in regulatory red tape that ultimately inhibits the private sector...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Federal Cyber Security: Are We Winning or Losing?

November 09, 2010 Added by:Jon Stout

The state of our cyber defense was summarized by Michael Chertoff when he concluded that it may take a digital 9-11 to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance and Shaping Cyber Policy

November 08, 2010 Added by:Marjorie Morgan

Melissa Hathaway will be discussing ongoing efforts to develop and promote concrete solutions for mitigating cyber risk. She led President Obama’s 60-day cyber space policy review. ISA and ANSI published The Financial management of Cyber Risk in direct response to Obama’s 60 day review...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Creating a Cyber Defense Team

November 07, 2010 Added by:Richard Stiennon

New threats and new measures to counter them call for a reorganization of IT security teams. The rise of targeted attacks must be met by organizational enhancements. The roles and responsibilities described here are required to mount an effective cyber defense...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

CFP for RSA Conference 2011 Metricon 5.5 Event

November 07, 2010 Added by:Anton Chuvakin

Mini-MetriCon 5.5 is a forum for quantifiable approaches and results to problems afflicting information security today, with a bias towards specific approaches that demonstrate the value of security metrics with respect to a security-related goal...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security Federal Government Threats

October 26, 2010 Added by:Jon Stout

An increasing number of adversaries are developing new options for penetrating the security of the United States through cyberspace, creating damage as well as conducting espionage. Cyberspace provides easily accessed and clear avenues along with the prospect of anonymity...

Comments  (1)

959779642e6e758563e80b5d83150a9f

The Case for a Security Consultant Guild

September 27, 2010 Added by:Danny Lieberman

The problem with ISC2 and similar industry lobbies is that they have vested interests, therefore they don't or can't represent independent security consultants. When was the last time Raytheon called me up asking to collaborate on a data security project for DoD? like never...

Comments  (4)

98180f2c2934cab169b73cb01b6d7587

CYBERCOM and Intelligence Community Jobs

September 07, 2010 Added by:Jon Stout

The new CYBERCOM, as a military and intelligence organization should approach the issue of Cyber Terrorism as a military campaign rather that a criminal action. Offensive Cyber operations and counter strikes will be approached with military precision like any other military campaign...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Intelligence and Cyber Command Job Opportunities

August 31, 2010 Added by:Jon Stout

The Cyber Command reorganization and consolidation creates significant employment opportunities for Cyber Security professionals and has the potential to allow for more rapid facilitation of high level security clearances. Training and certification is now a mandatory requirement for employment...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Cybersecurity: Free Markets versus Centralized Control

August 25, 2010 Added by:Anthony M. Freed

Will the free market conquer the eminent threat to information systems security, or will the free market be overwhelmed by government intercession, ultimately diminishing once free societies to the level of quasi-totalitarianism? The trend is indicative of a movement towards centralized control...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Yet Another Proposed Federal Data Security Bill

August 18, 2010 Added by:David Navetta

Many of us have watched over the past few years as dozens of proposed federal data security and breach notification bills have been introduced, often with bipartisan support, but have failed to become law. This year has seen many of the usual proposals...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)

98180f2c2934cab169b73cb01b6d7587

Vulnerability Management: The Changing Nature of Attacks

July 27, 2010 Added by:Jon Stout

Cyber terrorism, in addition to attacks on corporate networks, poses a direct threat to the U.S. military, civilian agencies and critical infrastructure. Because of the problems with attributing the attacks to the actual source, this threat has become difficult to contain...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

NPR Report Warns of Cyberdefense Shortage

July 23, 2010 Added by:Global Knowledge

James Gosler, who worked at the CIA, the National Security Agency and the Energy Department, estimates that there are only 1,000 or so people in the United States who have the skills necessary to meet our computer security needs. Quite a deficit, no?

Comments  (5)

Af2769c2480db78c589b811b428782b0

NSA Launches Perfect Citizen

July 10, 2010 Added by:Lee Mangold

There's been a lot of talk on the Island about the cyberwar term and this is yet another example: The Wall Street Journal reported that the NSA allegedly awarded a contract to Raytheon for an Information Security program called Perfect Citizen...

Comments  (11)

924ce315203c17e05d9e04b59648a942

New Federal Cyber Security Work Group

June 23, 2010 Added by:Richard Stiennon

A few weeks ago I participated in a cyber roundtable pulled together in Washington DC. This was, in part, a meeting to kick off a new organization that will seek to bring security technologists and policy makers together.  (Much more on this at a later date). 

Comments  (0)

Page « < 21 - 22 - 23 - 24 - 25 > »