-
The time for cybersecurity contracting is now
It is not just a fad: cybersecurity represented the largest request for funds in last year’s intelligence budget; it is an area for expansion government contractors cannot afford to pass up
-
-
Second round of CyberPatriot competition sees 80 teams advance
CyberPatriot, an education initiative produced by AFA to inspire students to consider science, technology, engineering, and mathematics fields in their studies, completed a second round of competition; nearly 400 teams registered in the All-Service Division, and approximately 80 teams scored high enough to compete again come 4 December; teams raced against time and their opponents quickly to find and effectively correct vulnerabilities in a virtual network
-
-
Keystroke biometric solution will protect against hacking
Virginia Tech researchers develop an authentication framework called “Telling Human and Bot Apart” (TUBA), a remote biometrics system based on keystroke-dynamics information; the technology will prevent hackers from using a computer program designed to produce keystroke sequences in order to spoof more conventional security systems
-
-
Sector Report for Thursday, 28 October 2010: Cybersecurity
This report contains the following stories.
Plus 1 additional story.
-
-
Cybersecurity bill not likely to pass this year
In an effort to give the president the power to combat any pending or existing cyber threat that could threaten critical infrastructure around the country, some lawmakers are looking to pass a new legislation that would give the president power to shut down some sections of the Internet during an attack or under the threat of an attack; the bill is not likely to pass in the Congress
-
-
Cybersecurity only bright spot among disappointing administration privacy grades
The Electronic Privacy Information Center (EPIC) gave the Obama administration a “B” grade on its cybersecurity efforts; the 2010 report card shows declining grade — relative to 2009 — for the administration efforts in the cyber privacy areas; EPIC gave President Obama a dismal “D” on civil liberties in 2010, compared to a “C+” in 2009
-
-
PwC recruits cybersecurity talent with online puzzles
PricewaterhouseCoopers (PwC) found a new way to recruit IT security professionals; it aimed to dig out U.K. talent hidden under the radar by settling up tests for hackers at different levels of ability, uncovering teenagers and people already working in the IT profession; PwC says that winning these cyber contests is typically an indication of good problem solving, curiosity to learn, and a driven work ethic
-
-
Millions in cybersecurity money go to the usual suspects
Both the U.S. and U.K. governments committed themselves to spending millions of dollars on enhanced cybersecurity — but industry insiders say that most of the money will not be used to buy innovative security solutions from start-ups, but rather go to the usual suspects; one insider says: “in the U.S., money gets spent on the vendors who spend millions lobbying Congress”
-
-
U.K. opens cybersecurity test range to test critical networks
The U.K. Ministry of Defense has opened a cybersecurity test range, where utilities and banks can pit their networks against human hackers and computer viruses
-
-
Fujitsu develops inter-cloud data security technology
With the advent of cloud computing, the boundary separating internal and external data has become increasingly blurred due to the utilization of external services; as a result, existing methods of preventing data leakage, such as only using a gateway to block the outflow of confidential data, have become insufficient, and there is increased demand for new security technology to allow the safe use of confidential data even in the cloud; Fujitsu offers a new data leakage prevention technology in cloud computing environments
-
-
GAO: U.S. slow to implement president's cyber security strategy
In May 2009 President Obama outlined his cyber policy strategy; a year and a half later, much of that strategy is yet to be implemented; a GAO report reveals that officials are making slow progress on all but two of the twenty-four specific goals highlighted in the president’s strategy
-
-
ID theft costs U.K. £2.7 billion a year
Identity fraud affects 1.8 million Britons every year, costing £2.7 billion in the process; victims can spend up to 200 hours undoing damage
-
-
Chinese hackers steal South Korean defense secrets
Chinese hackers have stolen secrets on South Korea’s defense and foreign affairs by using bogus e-mails claiming to come from Seoul officials and diplomats; similar attacks originating in China-based servers briefly crippled U.S. and South Korean government and commercial Web sites in July 2009
-
-
U.S. considering Aussie Internet security program
The Obama administration is considering adoption of parts of an Internet security scheme which will go into effect in Australia in December; the plan will allow Internet service providers to alert customers if their computers are taken over by hackers — and could limit these customers’ online access if they do not fix the problem
-
-
U.K. security firms say GCHQ's cyberattack warning overwrought
U.K. cybersecurity industry insiders say last week’s warnings by Britain’s cybersecurity chief about the cyber threat the U.K. was facing may have over-hyped threats — and may have been related more to the run-up to the U.K. government’s comprehensive spending review announcement than to new threat information
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.