Items Tagged with "Cyber Security"
September 27, 2010 Added by:Danny Lieberman
The problem with ISC2 and similar industry lobbies is that they have vested interests, therefore they don't or can't represent independent security consultants. When was the last time Raytheon called me up asking to collaborate on a data security project for DoD? like never...
September 07, 2010 Added by:Jon Stout
The new CYBERCOM, as a military and intelligence organization should approach the issue of Cyber Terrorism as a military campaign rather that a criminal action. Offensive Cyber operations and counter strikes will be approached with military precision like any other military campaign...
August 31, 2010 Added by:Jon Stout
The Cyber Command reorganization and consolidation creates significant employment opportunities for Cyber Security professionals and has the potential to allow for more rapid facilitation of high level security clearances. Training and certification is now a mandatory requirement for employment...
August 25, 2010 Added by:Anthony M. Freed
Will the free market conquer the eminent threat to information systems security, or will the free market be overwhelmed by government intercession, ultimately diminishing once free societies to the level of quasi-totalitarianism? The trend is indicative of a movement towards centralized control...
August 18, 2010 Added by:David Navetta
Many of us have watched over the past few years as dozens of proposed federal data security and breach notification bills have been introduced, often with bipartisan support, but have failed to become law. This year has seen many of the usual proposals...
July 30, 2010 Added by:Global Knowledge
Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...
July 27, 2010 Added by:Jon Stout
Cyber terrorism, in addition to attacks on corporate networks, poses a direct threat to the U.S. military, civilian agencies and critical infrastructure. Because of the problems with attributing the attacks to the actual source, this threat has become difficult to contain...
July 23, 2010 Added by:Global Knowledge
James Gosler, who worked at the CIA, the National Security Agency and the Energy Department, estimates that there are only 1,000 or so people in the United States who have the skills necessary to meet our computer security needs. Quite a deficit, no?
July 10, 2010 Added by:Lee Mangold
There's been a lot of talk on the Island about the cyberwar term and this is yet another example: The Wall Street Journal reported that the NSA allegedly awarded a contract to Raytheon for an Information Security program called Perfect Citizen...
June 23, 2010 Added by:Richard Stiennon
A few weeks ago I participated in a cyber roundtable pulled together in Washington DC. This was, in part, a meeting to kick off a new organization that will seek to bring security technologists and policy makers together. (Much more on this at a later date).
June 22, 2010 Added by:Marjorie Morgan
In conjunction with the American National Standards Institute (ANSI), ISA published its first handbook for enterprises which examines corporate cyber security from an economic perspective as much as the technical one.
June 17, 2010 Added by:Ron Lepofsky
Last night Pres Obama made a speech to the nation about the BP oil spill. One of his three central points dealt with preventing a future oil spill disaster. Today the President told BP to allocate billions of dollars to reimburse those who suffered as the result of BP’s oil spill. Perhaps now is the time to take similar action and allocate funds and sticks to pr...
June 16, 2010 Added by:Richard Stiennon
In 2001 Ralph Bendrath, a German cyber security writer and researcher, wrote a report that dug into the efficacy of the use of the term cyberwar. His report is remarkable in that most of what he covers ten years ago represents today’s state of affairs.
June 13, 2010 Added by:Anthony M. Freed
In continued efforts to centralize the cybersecurity authority within the White House, more than 40 bills have been introduced that will dramatically alter the balance of power between the government and the private sector. Protecting Cyberspace as a National Asset Act of 2010 will shift the responsibility of federal agency cybersecurity from the Office of Management and Budget (OMB) to DHS by cre...
June 07, 2010 Added by:Ron Baklarz
In case you have not been following the current slew of cyber security-related legislation that has been penned during the 111th Congress, there are currently 35 different laws in various stages of the legislative process. Melissa Hathaway, former White House cyber security advisor, has recently released a study of these legislations