-
Cybersecurity companies weather the economic downturn
Cybersecurity companies may have suffered during the economic downturn — but they suffered less; some companies even saw an increase in revenues; “The things that we’re delivering have become more of a necessity than a nice to have,” says the president of an Iowa-based company which provides technical support and corporate security for desktop computers — and which increased its annual revenue by 41 percent in 2009
-
-
U.S. government encounters shortage of skilled cyber-security workers
DHS and the FBI, among other government agencies, are now posting job openings in cybersecurity, describing the chief responsibilities of these jobs as preserving the nation’s freedoms and securing the homeland; the recruitment campaign is going slowly because the pool of truly skilled security professionals is a small one, and the government is only the latest suitor vying for their talents
-
-
More employers track their employees' every digital move
More and more companies are more and more interested in what their employees are doing with their PCs, laptops, and smartphones while in the office; sophisticated tracking and monitoring solutions allow employers to monitor any information its employees post publicly on Facebook and Twitter, and read e-mails and instant messages (even those you typed but decided not to send)
-
-
Adobe to patch zero-day Reader, Acrobat hole
On 12 January Adobe will release patches to fix zero-day vulnerabilities in Reader and Acrobat; malicious Adobe Acrobat PDF files are distributed via an e-mail attachment that, when opened, executes a Trojan that targets Windows systems, according to Symantec; the rate of infection is extremely limited and the risk assessment level is very low, the company said.
-
-
Prediction for 2010: The coming cloud crash
Technology maven Mark Anderson predicts a big remote-computing service disaster; “My hunch is that there will never really be a secure cloud,” he says; businesses will view cloud services more suspiciously and consumers will refuse to use them for anything important, he says
-
-
Cisco annual information security report highlights risks of social media
Cisco has released its annual information security report for 2009 and the year-end analysis; the report highlights the impact of social media on network security and the critical role that people — not technology — play in creating opportunities for cybercriminals.
-
-
New NIST director says U.S. faces "critical time in cybersecurity"
Patrick Gallagher, the new director of the U.S. National Institute of Standards and Technology, sees NIST’s role as a catalyst for the application of technology to pressing environmental, economic, and social concerns
-
-
Cyberattacks on U.S. military systems rise
In 2000, there were 1,415 cyber attacks on U.S. military networks; in all of 2008 there were 54,640 malicious cyber incidents targeting DoD systems; in the first six months of 2009 tThere were 43,785 such incidents.
-
-
Cyber security certification is not a panacea for cybersecurity woes
The U.S. Congress is deliberating proposals to require cybersecurity certification for cyber security professionals; although a good certification standard might be a measure of a baseline level of competence, it is not an indicator of job performance; having certified employees does not mean firewalls will be configured securely, computers will have up-to-date patches, and employees won’t write passwords on the backs of keyboards
-
-
Industry, academia join hands to solve U.S. most pressing cyber threats
Northrop Grumman forms cybersecurity research consortium to help secure the U.S. critical infrastructure and counter growing threats; consortium’s members include MIT, Carnegie Mellon, and Purdue
-
-
CERT Australia promotes on network security
Australia’s Attorney-General’s Department national security resiliency division says CERT Australia would be a two-way clearing house for notifications from local and international authorities, with responsibility for tracking down compromised machines in Australian domains
-
-
Top 10 information security trends for 2010
Further adoption of cloud, social media, and virtualization technologies will continue to blur the network parameter; organizations — large and small — should consider a layered, centralized security solution that provides multiple security touch points within the network, rather than around it
-
-
New report: The line between cybercrime and cyberwar is blurred
New McAffee cybersecurity report: “International cyber conflict has reached the tipping point where it is no longer just a theory, but a significant threat that nations are already wrestling with behind closed doors. The impact of a cyberwar is almost certain to extend far beyond military networks and touch the globally connected information and communications technology infrastructure upon which so many facets of modern society rely”
-
-
U.S. suspects terrorists are exploring counter-infrastructure cyber attacks
A lack of security protections in U.S. computer software increases the likelihood that terrorists could execute sophisticated counter-infrastructure attacks in the future; DHS official says that if terrorists were to amass such capabilities, they would be wielded with “destructive and deadly intent”
-
-
Cyber threats now targeting traditional companies
U.S. companies, even small and medium size, are more and more exposed to cyber threats from organized crime, foreign intelligence services, and probably terrorist organizations; 85 percent of U.S. critical infrastructure is owned and operated by private companies — and these companies are especially vulnerable to determined attacks which may ruin or seriously disrupt company operations
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.