Items Tagged with "Cyber Security"


Federal Cyber Security: Are We Winning or Losing?

November 09, 2010 Added by:Jon Stout

The state of our cyber defense was summarized by Michael Chertoff when he concluded that it may take a digital 9-11 to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing...

Comments  (0)


Internet Security Alliance and Shaping Cyber Policy

November 08, 2010 Added by:Marjorie Morgan

Melissa Hathaway will be discussing ongoing efforts to develop and promote concrete solutions for mitigating cyber risk. She led President Obama’s 60-day cyber space policy review. ISA and ANSI published The Financial management of Cyber Risk in direct response to Obama’s 60 day review...

Comments  (0)


Creating a Cyber Defense Team

November 07, 2010 Added by:Richard Stiennon

New threats and new measures to counter them call for a reorganization of IT security teams. The rise of targeted attacks must be met by organizational enhancements. The roles and responsibilities described here are required to mount an effective cyber defense...

Comments  (0)


CFP for RSA Conference 2011 Metricon 5.5 Event

November 07, 2010 Added by:Anton Chuvakin

Mini-MetriCon 5.5 is a forum for quantifiable approaches and results to problems afflicting information security today, with a bias towards specific approaches that demonstrate the value of security metrics with respect to a security-related goal...

Comments  (0)


Cyber Security Federal Government Threats

October 26, 2010 Added by:Jon Stout

An increasing number of adversaries are developing new options for penetrating the security of the United States through cyberspace, creating damage as well as conducting espionage. Cyberspace provides easily accessed and clear avenues along with the prospect of anonymity...

Comments  (1)


The Case for a Security Consultant Guild

September 27, 2010 Added by:Danny Lieberman

The problem with ISC2 and similar industry lobbies is that they have vested interests, therefore they don't or can't represent independent security consultants. When was the last time Raytheon called me up asking to collaborate on a data security project for DoD? like never...

Comments  (4)


CYBERCOM and Intelligence Community Jobs

September 07, 2010 Added by:Jon Stout

The new CYBERCOM, as a military and intelligence organization should approach the issue of Cyber Terrorism as a military campaign rather that a criminal action. Offensive Cyber operations and counter strikes will be approached with military precision like any other military campaign...

Comments  (0)


Intelligence and Cyber Command Job Opportunities

August 31, 2010 Added by:Jon Stout

The Cyber Command reorganization and consolidation creates significant employment opportunities for Cyber Security professionals and has the potential to allow for more rapid facilitation of high level security clearances. Training and certification is now a mandatory requirement for employment...

Comments  (0)


Cybersecurity: Free Markets versus Centralized Control

August 25, 2010 Added by:Anthony M. Freed

Will the free market conquer the eminent threat to information systems security, or will the free market be overwhelmed by government intercession, ultimately diminishing once free societies to the level of quasi-totalitarianism? The trend is indicative of a movement towards centralized control...

Comments  (0)


Yet Another Proposed Federal Data Security Bill

August 18, 2010 Added by:David Navetta

Many of us have watched over the past few years as dozens of proposed federal data security and breach notification bills have been introduced, often with bipartisan support, but have failed to become law. This year has seen many of the usual proposals...

Comments  (0)


US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)


Vulnerability Management: The Changing Nature of Attacks

July 27, 2010 Added by:Jon Stout

Cyber terrorism, in addition to attacks on corporate networks, poses a direct threat to the U.S. military, civilian agencies and critical infrastructure. Because of the problems with attributing the attacks to the actual source, this threat has become difficult to contain...

Comments  (1)


NPR Report Warns of Cyberdefense Shortage

July 23, 2010 Added by:Global Knowledge

James Gosler, who worked at the CIA, the National Security Agency and the Energy Department, estimates that there are only 1,000 or so people in the United States who have the skills necessary to meet our computer security needs. Quite a deficit, no?

Comments  (5)


NSA Launches Perfect Citizen

July 10, 2010 Added by:Lee Mangold

There's been a lot of talk on the Island about the cyberwar term and this is yet another example: The Wall Street Journal reported that the NSA allegedly awarded a contract to Raytheon for an Information Security program called Perfect Citizen...

Comments  (11)


New Federal Cyber Security Work Group

June 23, 2010 Added by:Richard Stiennon

A few weeks ago I participated in a cyber roundtable pulled together in Washington DC. This was, in part, a meeting to kick off a new organization that will seek to bring security technologists and policy makers together.  (Much more on this at a later date). 

Comments  (0)


ISAlliance Priority Projects for 2010

June 22, 2010 Added by:Marjorie Morgan

In conjunction with the American National Standards Institute (ANSI), ISA published its first handbook for enterprises which examines corporate cyber security from an economic perspective as much as the technical one.

Comments  (0)

Page « < 21 - 22 - 23 - 24 - 25 > »