-
Law enforcement agencies dig deeper into applicants' digital past
More and more police departments are digging deep into the social media accounts of applicants, requesting that candidates sign waivers allowing investigators access to their Facebook, MySpace, YouTube, Twitter, and other personal spaces; some agencies are demanding that applicants provide private passwords, Internet pseudonyms, text messages, and e-mail logs; of “particular concern” to law enforcement agencies is that defense lawyers could use officers’ posts to undercut their credibility in court
-
-
Best 300 U.S. student hackers compete for cybersecurity scholarships, prizes
The seventh Annual Cyber Security Awareness Week competition at the Polytechnic Institute of New York University; 120 teams from high schools across the country — consisting of 300 of the U.S. best student hackers — competed under the watchful eyes of representatives from the CIA, NSA, DHS, and NSA; the students compete for scholarships and prizes by solving simulated security crises likely to emerge in an increasingly wired world
-
-
Sector Report for Thursday, 11 November 2010: Cybersecurity
This report contains the following stories.
-
-
Cybersecurity standard published to protect global critical infrastructure
With industrial networks being increasingly connected to the hostile IT world, and the frequency and sophistication of malware growing exponentially, industrial stakeholders must act today to protect their critical systems; the International Instrument Users Association (WIB) releases comprehensive cybersecurity standard to protect critical industrial computers;
-
-
The time for cybersecurity contracting is now
It is not just a fad: cybersecurity represented the largest request for funds in last year’s intelligence budget; it is an area for expansion government contractors cannot afford to pass up
-
-
Second round of CyberPatriot competition sees 80 teams advance
CyberPatriot, an education initiative produced by AFA to inspire students to consider science, technology, engineering, and mathematics fields in their studies, completed a second round of competition; nearly 400 teams registered in the All-Service Division, and approximately 80 teams scored high enough to compete again come 4 December; teams raced against time and their opponents quickly to find and effectively correct vulnerabilities in a virtual network
-
-
Keystroke biometric solution will protect against hacking
Virginia Tech researchers develop an authentication framework called “Telling Human and Bot Apart” (TUBA), a remote biometrics system based on keystroke-dynamics information; the technology will prevent hackers from using a computer program designed to produce keystroke sequences in order to spoof more conventional security systems
-
-
Sector Report for Thursday, 28 October 2010: Cybersecurity
This report contains the following stories.
Plus 1 additional story.
-
-
Cybersecurity bill not likely to pass this year
In an effort to give the president the power to combat any pending or existing cyber threat that could threaten critical infrastructure around the country, some lawmakers are looking to pass a new legislation that would give the president power to shut down some sections of the Internet during an attack or under the threat of an attack; the bill is not likely to pass in the Congress
-
-
Cybersecurity only bright spot among disappointing administration privacy grades
The Electronic Privacy Information Center (EPIC) gave the Obama administration a “B” grade on its cybersecurity efforts; the 2010 report card shows declining grade — relative to 2009 — for the administration efforts in the cyber privacy areas; EPIC gave President Obama a dismal “D” on civil liberties in 2010, compared to a “C+” in 2009
-
-
PwC recruits cybersecurity talent with online puzzles
PricewaterhouseCoopers (PwC) found a new way to recruit IT security professionals; it aimed to dig out U.K. talent hidden under the radar by settling up tests for hackers at different levels of ability, uncovering teenagers and people already working in the IT profession; PwC says that winning these cyber contests is typically an indication of good problem solving, curiosity to learn, and a driven work ethic
-
-
Millions in cybersecurity money go to the usual suspects
Both the U.S. and U.K. governments committed themselves to spending millions of dollars on enhanced cybersecurity — but industry insiders say that most of the money will not be used to buy innovative security solutions from start-ups, but rather go to the usual suspects; one insider says: “in the U.S., money gets spent on the vendors who spend millions lobbying Congress”
-
-
U.K. opens cybersecurity test range to test critical networks
The U.K. Ministry of Defense has opened a cybersecurity test range, where utilities and banks can pit their networks against human hackers and computer viruses
-
-
Fujitsu develops inter-cloud data security technology
With the advent of cloud computing, the boundary separating internal and external data has become increasingly blurred due to the utilization of external services; as a result, existing methods of preventing data leakage, such as only using a gateway to block the outflow of confidential data, have become insufficient, and there is increased demand for new security technology to allow the safe use of confidential data even in the cloud; Fujitsu offers a new data leakage prevention technology in cloud computing environments
-
-
GAO: U.S. slow to implement president's cyber security strategy
In May 2009 President Obama outlined his cyber policy strategy; a year and a half later, much of that strategy is yet to be implemented; a GAO report reveals that officials are making slow progress on all but two of the twenty-four specific goals highlighted in the president’s strategy
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.