-
IT security jobs largely untouched by economic slowdown
New reports describe a surprising stability in the information security job market amid all the cost-cutting and layoffs that are taking place; regulatory compliance demands, increasing data protection requirements stemming from wireless deployments and rollouts of virtualization technology, and growing consumer angst over data breaches combine to blunt the toll recession takes on information security jobs, salaries
-
-
Bolstering cyber defense
Against the backdrop of tens of thousands of reported attacks and breaches of government and private computer systems each year, Cobham’s subsidiary awarded a $8.6 million contract to develop cybersecurity test and evaluation technology
-
-
Cybersecurity contractor's network hacked
A large U.S. government contractor specializing in providing cybersecurity and privacy services, has warned its employees their personal information may have been stolen after hackers planted a virus on its computer network
-
-
The five considerations in advancing video surveillance in security
Video surveillance has become an integral part of security; more CSOs are finding it is necessary to integrate video into overall IT security; Eric Eaton offers a good discussion of the five criteria that should be considered in an effective integration of video surveillance and IT security
-
-
Check Point releases impressive FY2008, Q4 2008 financial results
IT security company Check Point release financial results for Q4 2008 and FY 2008; revenue increase 11 percent to $808.5 million; GAAP operating income was $356.5 million
-
-
Napolitano issues additional action directives
DHS secretary Napolitano issues additional Action Directives on cyber security and northern border strategy
-
-
Heartland says it has fixed security problem
Heartland Payment Systems, the sixth-largest payment processor in the United States, processes payments for 250,000 companies; thieves install malicious program on company’s computers which captured data as it flowed across the network
-
-
Experts watch for Conficker superworm to be activated
Conficker has infected at least 9 million computers; security experts anxiously wait for it to be activated; infection dwarfs the zombie army created by the infamous Storm worm, which reached a mere 1 million at its peak in September 2007
-
-
U.S. Air Force to train hundreds yearly in cyber warfare skills
As the U.S. Air Force becomes more dependent on information and networks, it needs more officers trained in cyber warfare — both to protect U.S. cuber systems, and do damage to the adversary’s systems
-
-
GAO: IRS still vulnerable to cyber breaches
U.S. tax collector makes but slow progress on vulnerabilities: Government watchdog finds that agency has fixed just 49 of 115 computer security problems found by the GAO in the November audit
-
-
The largest data breach ever?
In what may yet be the largest personal information breach ever, Heartland Payment Systems, which processes payroll and credit card payments for more than 250,000 businesses, announces that consumer credit card data may have been exposed
-
-
Sacked employee crashes employer's computers in malware revenge attack
An employee in a company which provides IT systems to fast-food restaurant is fired; he plants three malicious systems-cacheing files on systems connected to the company’s extranet, causing damage estimated qt $49,000
-
-
List of worst 25 programming errors ever Released
Leading cyber security organizations release a list of the worst 25 programming errors ever; it is a scary list
-
-
The cyber security agenda of the new administration
U.S. national leaders do grasp the importance of network security and information assurance — but seeing the problem is not the same thing as solving it
-
-
IT security spending to grow despite economic slowdown
Forrester Research finds that companies are still spending to protect their data — and that they will spend more in 2009; respondents to survey say security is an ongoing necessity unaffected by economic peaks and valleys
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.