-
Web and network firewalls remain central to network defense
Many vendors try to position their solutions as compliance-focused, but firewall-related tools may offer the best value in meeting wide-ranging compliance objectives
-
-
Russia's cyber warfare strategies, I
The August 2008 Georgia-Russia war was accompanied by a sustained, well-integrated, and pre-planned information warfare campaign against Georgia’s Internet structure
-
-
U.S. Air Force launches cyber command
The 24th Air Force will “provide combat-ready forces trained and equipped to conduct sustained cyber operations”
-
-
Gallagher PowerFence system secures Ports of Auckland
A key factor in the decision to install a PowerFence system was that it is an intelligent system; it consists of independent fence zones which can be uniquely identified to accurately detect attack attempts to facilitate a fast appropriate response
-
-
Über-hacker Albert "Segvec" Gonzalez's plea scuttled by indictment
Gonzalez’s attorney was close to taking responsibility for his crimes and agreeing to a sentence of about twenty years when hew was indicted on new counts on Monday
-
-
DHS plans wiki for agencies
Wiki will be used by DHS’s National Cyber Security Center (NCSC) and the six other federal cybersecurity centers as a collaboration tool and a way to develop improved situational awareness, communication and information sharing
-
-
TeleContinuity, SRA to support national communication system
TeleContinuity will help the National Communications System’s (NCS) national security and emergency preparedness programs in providing critical continuity of communications expertise, preserving the ability of federal agencies to maintain Continuity of Government (COG) when it is most vital - during disasters, emergencies, evacuations, or pandemics
-
-
Making software safer
More and more security systems in aircraft and motor vehicles rely on software for their operation; Aussie researchers develop away to make sure such software is safe
-
-
NIST publishes final version of new cybersecurity recommendations
NIST’s cybersecurity recommendations for government aim to create a unified framework which will result in the defense, intelligence and civil communities using a common strategy to protect critical federal information systems and associated infrastructure
-
-
Digital certificate standard compromised by hackers
Researchers demonstrated exploits against the X.509 standard for digital certificates used by Secure Sockets Layer; Deputy Defense Secretary Robert Lentz, DOD’s chief information assurance officer, cited identity authentication as a key security challenge for the department
-
-
University of Detroit Mercy receives cyber security research contract
The aim of the $551,500 federal contract is to develop and disseminate the knowledge necessary to ensure that the software that enables America’s business and critical infrastructure is safe and secure
-
-
Cobham reports a 32 percent increase in first-half profits
Company benefits from strategic investments in military and government markets; its work with M/A-COM, which it acquired from Tyco Electronics in September 2008, had resulted in increased technology collaboration and new contract awards
-
-
Cybersecurity is now a must for the grid, II
Cyber security has become a permanent part of running an electric plant because connectivity to the outside world is inevitable; plants are bringing together the expertise of consultants, vendors, and their IT departments to ensure that they are well protected
-
-
IT graduate sues school over failure to land a job
Tina Thompson majored in IT studies at Monroe College in the Bronx, New York; she has failed to find an IT job, so she is suing the school for reimbursement of her tuition — $70,000 — plus an additional $2,000 “for the stress I have been going through looking for a full-time job”
-
-
Hacking schools flourish in China
Chinese hackers have been on the forefront of sustained hacking and disruption campaign against Western business and government networks — some do it for fun, other for profit, but many do so on behalf of the Chinese government and its many intelligence and military agencies; ever wondered where all these hackers come from? “Hacker schools” are big business in China, generating $34.8 million last year
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.