Items Tagged with "Cyber Security"


924ce315203c17e05d9e04b59648a942

Creating a Cyber Defense Team

November 07, 2010 Added by:Richard Stiennon

New threats and new measures to counter them call for a reorganization of IT security teams. The rise of targeted attacks must be met by organizational enhancements. The roles and responsibilities described here are required to mount an effective cyber defense...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

CFP for RSA Conference 2011 Metricon 5.5 Event

November 07, 2010 Added by:Anton Chuvakin

Mini-MetriCon 5.5 is a forum for quantifiable approaches and results to problems afflicting information security today, with a bias towards specific approaches that demonstrate the value of security metrics with respect to a security-related goal...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security Federal Government Threats

October 26, 2010 Added by:Jon Stout

An increasing number of adversaries are developing new options for penetrating the security of the United States through cyberspace, creating damage as well as conducting espionage. Cyberspace provides easily accessed and clear avenues along with the prospect of anonymity...

Comments  (1)

959779642e6e758563e80b5d83150a9f

The Case for a Security Consultant Guild

September 27, 2010 Added by:Danny Lieberman

The problem with ISC2 and similar industry lobbies is that they have vested interests, therefore they don't or can't represent independent security consultants. When was the last time Raytheon called me up asking to collaborate on a data security project for DoD? like never...

Comments  (4)

98180f2c2934cab169b73cb01b6d7587

CYBERCOM and Intelligence Community Jobs

September 07, 2010 Added by:Jon Stout

The new CYBERCOM, as a military and intelligence organization should approach the issue of Cyber Terrorism as a military campaign rather that a criminal action. Offensive Cyber operations and counter strikes will be approached with military precision like any other military campaign...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Intelligence and Cyber Command Job Opportunities

August 31, 2010 Added by:Jon Stout

The Cyber Command reorganization and consolidation creates significant employment opportunities for Cyber Security professionals and has the potential to allow for more rapid facilitation of high level security clearances. Training and certification is now a mandatory requirement for employment...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Cybersecurity: Free Markets versus Centralized Control

August 25, 2010 Added by:Anthony M. Freed

Will the free market conquer the eminent threat to information systems security, or will the free market be overwhelmed by government intercession, ultimately diminishing once free societies to the level of quasi-totalitarianism? The trend is indicative of a movement towards centralized control...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Yet Another Proposed Federal Data Security Bill

August 18, 2010 Added by:David Navetta

Many of us have watched over the past few years as dozens of proposed federal data security and breach notification bills have been introduced, often with bipartisan support, but have failed to become law. This year has seen many of the usual proposals...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)

98180f2c2934cab169b73cb01b6d7587

Vulnerability Management: The Changing Nature of Attacks

July 27, 2010 Added by:Jon Stout

Cyber terrorism, in addition to attacks on corporate networks, poses a direct threat to the U.S. military, civilian agencies and critical infrastructure. Because of the problems with attributing the attacks to the actual source, this threat has become difficult to contain...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

NPR Report Warns of Cyberdefense Shortage

July 23, 2010 Added by:Global Knowledge

James Gosler, who worked at the CIA, the National Security Agency and the Energy Department, estimates that there are only 1,000 or so people in the United States who have the skills necessary to meet our computer security needs. Quite a deficit, no?

Comments  (5)

Af2769c2480db78c589b811b428782b0

NSA Launches Perfect Citizen

July 10, 2010 Added by:Lee Mangold

There's been a lot of talk on the Island about the cyberwar term and this is yet another example: The Wall Street Journal reported that the NSA allegedly awarded a contract to Raytheon for an Information Security program called Perfect Citizen...

Comments  (11)

924ce315203c17e05d9e04b59648a942

New Federal Cyber Security Work Group

June 23, 2010 Added by:Richard Stiennon

A few weeks ago I participated in a cyber roundtable pulled together in Washington DC. This was, in part, a meeting to kick off a new organization that will seek to bring security technologists and policy makers together.  (Much more on this at a later date). 

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance Priority Projects for 2010

June 22, 2010 Added by:Marjorie Morgan

In conjunction with the American National Standards Institute (ANSI), ISA published its first handbook for enterprises which examines corporate cyber security from an economic perspective as much as the technical one.

Comments  (0)

5a432ca05467666d90425b7b869c5003

Is the U.S. prepared for cyber war or are we sitting ducks?

June 17, 2010 Added by:Ron Lepofsky

Last night Pres Obama made a  speech  to the nation about the BP oil spill.  One of his three central points dealt with preventing a future oil spill disaster.  Today the President  told BP to allocate billions of dollars to reimburse those who suffered as the result of BP’s oil spill. Perhaps now is the time to take similar action and allocate funds and sticks to pr...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Cyberwar Debate Rages On

June 16, 2010 Added by:Richard Stiennon

In 2001 Ralph Bendrath, a German cyber security writer and researcher, wrote a report that dug into the efficacy of the use of the term cyberwar. His report is remarkable in that most of what he covers ten years ago represents today’s state of affairs.

Comments  (0)

Page « < 21 - 22 - 23 - 24 - 25 > »