• ITU for cyber treaty to tackle cyber security problems

    ITU mulls an international cyber treaty to tackle cyber crime; the cyber treaty will have elements including governments being committed to protect cyber security and citizens not harboring terrorists in their own territories

  • TSA awards CSC a $489 million IT infrastructure contract

    TSA awards CSC an IT infrastructure protection contract worth approximately $489 million for a five year life cycle; the contract is for the deployment, maintenance, and enhancement of TSA’s IT infrastructure capabilities

  • view counter
  • Federal agencies outline government's cybersecurity goals

    Government representatives outlined to the attendees at the IEEE Symposium on Security and Privacy the current U.S. cybersecurity research and development goals — and needs; the representatives outlined the need for a better understanding of the economics of security in order to gain a clearer picture of what types of investments would help defenders, and they asked for solutions that might again shift the advantage away from attackers

  • Today's IT security professionals are expected to offer more than a school certificate

    Demand for IT security specialists in both the private sector and government grows steadily; IT security is the No. 1 growth industry in the government and government contractor sectors; employers, however, no longer see IT security certification as a sufficient qualification, and are looking for a broader set of skills

  • U.S. Air Force shifts 30,000 troops to "cyberwar front lines"

    The USAF has assigned 30,000 to cyberwarfare specialties; 3,000 will become cyberspace officers; Brigadier David Cotton, director of cyberspace transformation, says about the new specialty: “It’s not just spray paint, it’s a new mindset”

  • A first: Commercial quantum cryptography system hacked

    Physicists have mounted the first successful attack of its kind on a commercial quantum cryptography system; since in the real world it is impossible to get rid of errors entirely, quantum encryption tolerates a small level of error; various proofs show that if the quantum bit error rate is less than 20 percent, then the message is secure; these proofs, though, assume that the errors are the result of noise from the environment; researchers show how hackers can exploit this assumption

  • view counter
  • Cyber bill would create strong cyber director post, tighten cyber monitoring of agencies

    New bill being debated in the House Of Representatives would create a cyberspace director position that requires confirmation from the Senate and create a national cyberspace office; the legislation would also provide the new cyber coordinator position with budgetary authority, which is presently lacking

  • The boom (or is it a bubble?) in federal cybersecurity

    The Obama administration and Congress are allocating more funds to cybersecurity; much of that new spending, estimated at $6 to $7 billion annually just in unclassified work, is focused on the Washington region, as the federal government consolidates many of its cybersecurity-focused agencies in the area; some VCs warn of a cybersecurity bubble

  • Cybersecurity summit pays little attention to control system's security

    Despite threats of infrastructure attacks, scant attention was paid to control systems during a global security conference; the problem is safeguarding infrastructure’s control systems against attackers is that such protection requires a different approach to securing PCs or networks; Windows-based security products will not help; says one expert: “All the devices that sense things — temperature, pressure, flow, and things like that — are not Windows, those are proprietary, real-time or embedded, and there’s no security there”

  • U.K. launches competition to find cyber security experts

    The United Kingdom suffers from a dearth of cybersecurity experts; several private and public organizations have launched the Cyber Security Challenge competition — a series of challenges and games that would test the talent and skills of people; the challenges will be built around eight key skill areas which include digital forensics, network analysis and logical thinking

  • Infosec 2010: Prepare for the information security revolution

    New PwC report shows how information security threats will evolve until 2020; the huge increase in the amount of data available on the Web is largely the result of the number of people who have internet access. This will mean more money is transacted online, which will attract cyber criminals

  • New research offers security for virtualization, cloud computing

    Virtualization allows the pooling of the computational power and storage of multiple computers, which can then be shared by multiple users; problem is, gains in efficiency and cost-saving are offset by increased cyber vulnerability; researchers have now developed software, called HyperSafe, that leverages existing hardware features to secure hypervisors against such attacks

  • Passwords may be passé, but biometrics is not yet viable for portable devices

    Passwords may be heading toward extinction, but biometric identification is not yet a viable means of authentication for mobile devices; smart phones and other portable devices do not currently have the sophistication to be adapted easily for biometric technology, and users are likely to be reluctant to carry yet another device and its electrical charger along with their smart phone simply to login to their bank account when not at their desktop computer

  • Data protection manager for the cloud

    More and more companies begin to offer cloud security solutions; Iron Mountain offers CloudRecovery links into DPM; Seagate’s i365 business has launched the EVault for DPM 2010 backup and recovery appliance

  • Companies ignore cloud security

    New study finds that few businesses build security into cloud contracts; in fact, three-quarters of businesses surveyed said they had no procedures and policies for using cloud computing; Sixty-eight percent said end users and business managers — not the organization’s IT professionals — are made responsible for evaluating cloud computing vendors