-
House of Lords hears evidence on risk of cyberterattacks
The House of Lords hears evidence that the U.K. communication system is vulnerable to cyberattacks; experts advised the Lords that since up to 90 percent of the critical infrastructure on which Europe depends is privately owned and crosses international boundaries, then only co-operative planning between public and private sectors, as well as EU member states, can hope to deal with the risks.
-
-
Cisco annual information security report highlights risks of social media
Cisco has released its annual information security report for 2009 and the year-end analysis; the report highlights the impact of social media on network security and the critical role that people — not technology — play in creating opportunities for cybercriminals.
-
-
Industry, academia join hands to solve U.S. most pressing cyber threats
Northrop Grumman forms cybersecurity research consortium to help secure the U.S. critical infrastructure and counter growing threats; consortium’s members include MIT, Carnegie Mellon, and Purdue
-
-
CERT Australia promotes on network security
Australia’s Attorney-General’s Department national security resiliency division says CERT Australia would be a two-way clearing house for notifications from local and international authorities, with responsibility for tracking down compromised machines in Australian domains
-
-
Top 10 information security trends for 2010
Further adoption of cloud, social media, and virtualization technologies will continue to blur the network parameter; organizations — large and small — should consider a layered, centralized security solution that provides multiple security touch points within the network, rather than around it
-
-
New report: The line between cybercrime and cyberwar is blurred
New McAffee cybersecurity report: “International cyber conflict has reached the tipping point where it is no longer just a theory, but a significant threat that nations are already wrestling with behind closed doors. The impact of a cyberwar is almost certain to extend far beyond military networks and touch the globally connected information and communications technology infrastructure upon which so many facets of modern society rely”
-
-
U.S. Army funds a new discipline: Network Science
The U.S. Army gives Rensselaer Polytechnic in New York State $16.75 million to launch the Center for Social and Cognitive Networks; the new center will link together top social scientists, neuroscientists, and cognitive scientists with leading physicists, computer scientists, mathematicians, and engineers in the search to uncover, model, understand, and foresee the complex social interactions that take place in today’s society
-
-
GAO: U.S. unready to face growing cyber threats
A GAO reports says that cyber-threats facing federal networks and the U.S. critical infrastructure are becoming increasingly sophisticated; the number of attacks is exponentially growing (security incidents grew “by over 200 percent from fiscal year 2006 to fiscal year 2008”), the report concludes that the United States is not optimally prepared to protect itself from such attacks
-
-
U.S. suspects terrorists are exploring counter-infrastructure cyber attacks
A lack of security protections in U.S. computer software increases the likelihood that terrorists could execute sophisticated counter-infrastructure attacks in the future; DHS official says that if terrorists were to amass such capabilities, they would be wielded with “destructive and deadly intent”
-
-
CSC wins DHS IT infrastructure and cyber security task order
CSC won a contract to provide information technology infrastructure and cyber support to the National Protection and Programs Directorate’s Office of Cyber Security and Communications; among other things, the company will design and build an expanded watch floor that will integrate national security capabilities from the U.S. Computer Emergency Response Team (US CERT) and the National Coordinating Center of the National Communications System
-
-
Growth trends in software security favor Beyond Encryption
Irish company specializing in developing software for protecting sensitive data stands to benefit from growth trends in the global security software market; most encryption products rely on the user having to remember a password to unlock their data; the approach of Beyond Encryption is to have access controlled by an administrator so that the data is protected wherever it goes
-
More headlines
Who's online
There are currently 0 users and 0 guests online.
The long view
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.