-
U.K. government slashes police's cybercrime budget by 30 percent
When on the opposition benches, Tory MP James Brokenshire (Old Bexley & Sidcup) said: “if you don’t prioritize cybercrime you compromise national cyber-security”; he is now a junior Home Office minister, presiding over a 30 percent cut in the cybercrime budget of the U.K. national police; security experts, industry, and academics are not happy
-
-
IG: computer systems connected to DHS network are not secure
DHS IG reports that DHS has failed to validate the security of computer systems that connect to the primary network, introducing vulnerabilities and putting sensitive information at risk; specifically, the IG detected vulnerabilities in systems connecting to the main department network from Customs and Border Control (CBP); Immigration and Customs Enforcement (ICE); and the Science and Technology Directorate (S&T), including missing security patches, weak passwords, and a lack of access controls that prevent unauthorized users from opening sensitive applications
-
-
Aussies revamp cyberdefense strategy
The Australian federal government has decided to stop supporting AusCERT in favor of a new computer emergency response team more focused on providing an early warning system for utilities, banks, and other critical infrastructure firms
-
-
Sector Report for Thursday, 10 June 2010: Cybersecurity
This report contains the following stories.
Plus 3 additional stories
-
-
Obama's 29 May 2009 cybersecurity speech: a year on
On 29 May 2009 president Obama said “America’s economic prosperity in the 21st century will depend on cybersecurity”; since then the United States has moved systematically toward enhancing cybersecurity through the following initiatives, but much remains to be done
-
-
Uncle Sam wants 10,000 new cybersecurity professionals
The United States needs tens of thousands of cybersecurity practitioners, researchers, and — more recently — warriors; U.S. Cyber Challenge launches a nation-wide talent search; this summer, cybersecurity camps will be conducted in three states — California, New York, and Delaware; the goal is thirty-five camps in thirty-two states for next year
-
-
Commander of U.S. Cyber Command calls for cyber rules of engagement
Commander of the newly created U.S. Cyber Command says there need to be two sets of rules of cyber engagement — one to cover peacetime situations and another for war; General Keith Alexander said the issue is complicated by the possibility that an adversary may use a neutral country’s computers to launch the attack
-
-
Symantec acquisitions contribute to making encryption-as-a-feature commonplace
Encryption has been a growth market, fostered by increasingly stringent regulations from data breach notification laws, now in more than forty states, and tougher Health Insurance Portability and Accountability Act (HIPAA) rules, to the Payment Card Industry Data Security Standards (PCIDSS)
-
-
21st Century Technologies acquires D.C.-area cyber-security firm
21st Century Technology (21CT), a developer of advanced intelligence analytics software to combat terrorist threats and cyber threats, acquires a specialist in defenses against network intrusions
-
-
Lookingglass named finalist for Best Cyber Security Company
Lookingglass Cyber Solutions’s ScoutVision allows corporations to monitor networks and infrastructure they are not in control of, but rely upon for day-to-day operations; the company is finalist in Maryland Incubator of the Year Awards program
-
-
New solution offers biometric security to mobile devices
Aussie company offers a biometric security solution for mobile devices; a Bio-button token is authenticated by the user, and as long as the Bio-button remains in the range of the mobile device, the authentication will remain active. This means that if the phone or mobile device is stolen, lost, or moved away from the token, the pairing is disconnected and the authentication broken
-
-
Agency wants data on enterprise cyber forensics system products
TSA solicits information about commercially available computer security forensics technologies it could use for information technology security; TSA is interested in products that would give the agency the ability to scan, capture, identify, report, and resolve IT forensics matters
-
-
DHS considers merging infrastructure protection, cybersecurity units
The connectedness between the U.S. critical infrastructure assets and the Internet steadily increases, so the missions of DHS’s infrastructure protection and cybersecurity units become more intertwined as well; the department considers merging the two units
-
-
Melissa Hathaway highlights nine important cyber bills
Congress is getting more and more involved in cyber issues; Melissa Hathaway, former White House cybersecurity official, examines the pending legislation and highlights nine bills — out of the 40-odd bills at various stages in the legislative process — which she considers to be the most important ones to watch
-
-
U.S. Cyber Command launched
The United States launches a new military command — the U.S. Cyber Command — and Army General Keith Alexander receives a fourth star and will serve as CyberCom’s first commander; the mission of CyberCom is to synchronize the Defense Department’s various networks and cyberspace operations to better defend them against the onslaught of cyberattacks
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.