-
Cyber Tracker has second Middle Eastern client
Violence is never too far from the surface in the Middle East, but a rash of Syrian-sponsored assassinations in Beirut and al Queda-inspired suicide bombings in Amman lead local businesses to take security measures
-
-
Security Alliance calls for greater leadership in protecting U.S. information infrastructure
The 9/11 Commission gave the administration many F’s and D’s on keeping America safe, and the leading U.S. cyber security alliance agrees, while calling on the administration to show more leadership — and more energy — in protecting the nation’s IT infrastructure
-
-
The lesson of Titan Rain: Articulate the dangers of cyber attack to upper management
Last year the debate raged over whether Titan Rain was sponsored by the Chinese government or was the work of hackers, but either way one lesson is clear: IT administrators should talk to top management
-
-
SANS to offer graduate-level degree program in information security
As demand for qualified homeland security personnel increases, prestigious cybersecurity institute launches graduate degree programs in IT security
-
-
CounterStorm receives $9.5 million in Series B funding
CounterStorm leads the way in addressing an especially dangerous cyber threat — zero-day attacks. Customers like the product, and investors like the company
-
-
Innofone conducts successful IPv6 summit
Innofone is the only company dedicated exclusively to demonstrating how to exploit the benefits of the futuristic IPv6, and more and more companies are interested in what it has to offer
-
-
-
Brown ignored reports of FEMAs inadequate disaster plans – a year before Katrina
Thousands of FEMA documents reveal organization’s inadequacies, Brown’s negligence
-
-
HISS files for NASDAQ BB, acquires GPS specialist ActSoft
Cyber Tracker maker acquires Comet Tracker maker
-
-
Falkenrath joins advisory board of mesh-networking specialist PacketHop
Mesh networking is a food emergency communication solution, and Falkenrath can help bring in clients
-
-
-
-
-
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.