-
Cyber security measure requires more information sharing
The Cyber Intelligence Sharing and Protection Act of 2011 (H.R. 3523) made it through the House Permanent Select Committee on Intelligence on 1 December on a 17-1 vote. It is one of a dozen or so cyber security-related legislative initiatives proposed by lawmakers this year. The effort is bipartisan, having been introduced by committee chairman Mike Rogers (R-Michigan) and ranking member Dutch Ruppersberger (D-Maryland). The bill aims to promote greater information sharing between the federal government and U.S. businesses.
-
-
Making domain names safe and reliable
DHS Science and Technology Directorate (S&T) says it is doing its part to make Web sites more secure and reliable by enhancing the Domain Name System (DNS), which translates Web-site names like science.com into a network address like 1.2.3.4
-
-
GAO reports problems in cybersecurity hiring strategy
An audit by the Government Accountability Office (GAO) has found that some government agencies have failed to effectively develop or implement cybersecurity workforce planning strategies; agencies also reported problems in filling some cybersecurity positions, particularly those requiring specialized skills
-
-
Top Nine cyber security trends for 2012
Imperva, a data security specialist, see nine emergeing cyber security trends in 2012; rise in big data and application DDoS attacks among key concerns; “Hacking, by nature, is a discipline that relies on innovation,” explained Imperva CTO; “Knowing future, potential threats helps security teams fight against the bad guys”
-
-
Disaster-proofing email servers for maximum resiliency
On Tuesday Databarracks announced the launch of its Hosted Exchange solution, which allows companies to host email servers in a virtually indestructible location – a former U.K. Ministry of Defense bunker designed to protect critical systems in the event of a nuclear war
-
-
NERC CIP-compliant grid security reporting tool
NERC CIP Standard is a comprehensive framework of physical and cyber security best practices to safeguard the bulk power system for North America; Skybox Security shows NERC CIP-compliant grid security reporting tool
-
-
Interface could help Facebook members limit security leaks
Researchers develop a sign-up interface for Facebook apps could help members prevent personal information — and their friends’ information — from leaking out through third-party games and apps to hackers and identity thieves
-
-
Cyber-attackers think as regular crooks
An engineer and a criminologist are applying criminological concepts and research methods in the study of cybercrime; their work has produced recommendations for IT managers to use in the prevention of cyber attacks on their networks
-
-
A Winner in DARPA’S Shredder Challenge competition
A small team from San Francisco won the $50,000 first prize in DARPA’s Shredder Challenge, a competition among teams trying to reconstruct shredded documents; in total, the winning team spent nearly 600 man-hours developing algorithms and piecing together documents that were shredded into more than 10,000 pieces
-
-
Lockheed Martin UK opens its U.K. cybersecurity center
Lockheed Martin UK has officially opened its first Security Intelligence Center (SIC) at Farnborough; the role of the SIC will be detection, identification, and response to information security incidents; this is accomplished by bringing together three primary capabilities: pervasive sensors, data management, and analyst collaboration
-
-
Both hackers and security vendors are embracing the cloud
Large-volume hackers are now using the cloud for lucrative large-scale attacks, using public infrastructure to put at risk companies which adopt ambitious but poorly considered cloud-computing strategies. Even as they move to the cloud, too many companies simply move their security and reliability problems from the current infrastructure to the new one.
-
-
Top 5 influential IT security thinkers
There are many tough challenges security professionals must contend with each day. This special section of SC Magazine focuses on people who represent the highest degree of professionalism in the IT security field, “individuals who stand out for their technical skills, managerial prowess, insight and advocacy.”
-
-
Congressional approval of cybersecurity bill looks promising
Amid the partisan acrimony of the budget battles on Capitol Hill, the Obama administration and the Senate have made promising efforts to pass a sweeping cybersecurity bill in a rare show of bipartisan agreement; the bill is now at the top of the Senate’s agenda, and Senator Harry Reid (D – Nevada), the majority leader, said he plans to bring the bill to the floor during the first working session of 2012
-
-
Some smartphones are more vulnerable to attack
New research shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making these phones more vulnerable to attack
-
-
U.K. unveils new cyber defense strategy
The U.K. government last week published its new Cyber Security Strategy; the government said the new strategy sets out “how the United Kingdom will support economic prosperity, protect national security, and safeguard the public’s way of life”
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.