• Ranking countries’ cyberattack preparedness

    A new McAfee cybersecurity survey concluded that Israel, Finland, and Sweden are leading other countries in “cyber-readiness”; the report says that China, Brazil, and Mexico are among the least cyber-prepared to defend these countries’ networks against cyber attacks

  • Gender gap hinders cybersecurity hiring boom

    As governments and private businesses clamor to hire computer experts, women are conspicuously missing from the employment boom; women account for over half the professional workforce, yet only 25 percent of information technology jobs are filled by females

  • Sandia addresses complex DNS vulnerabilities

    A Sandia researcher has developed a visualization tool to help network administrators within the federal government and global IT community better understand Domain Name System Security (DNSSEC) and also help them troubleshoot problems

  • UMD, Lunarline partner on cybersecurity

    The University of Maryland Cybersecurity Center will partner with Lunarline Inc. on cybersecurity education, research, and technology development

  • National Guardsmen, the new front line in cybersecurity

    In an aggressive push to expand the military’s cyber warfare and defense capabilities, the National Guard has formed an increasing number of special cybersecurity units; National Guard cybertroops have proven to be particularly appealing solution, especially with defense cuts looming, as they cost less to train, maintain, and retain than active duty forces

  • Government outlines cybersecurity R&D priorities

    The Obama administration recently unveiled its plan for government sponsored cybersecurity research and development programs

  • $3 million NSF grant for research into assured data provenance

    The National Science Foundation supports funds new cyber security research into assured data provenance, the discipline of computer science concerned with the integrity and privacy of data sources, contents, and successive transformations

  • Cyber security measure requires more information sharing

    The Cyber Intelligence Sharing and Protection Act of 2011 (H.R. 3523) made it through the House Permanent Select Committee on Intelligence on 1 December on a 17-1 vote. It is one of a dozen or so cyber security-related legislative initiatives proposed by lawmakers this year. The effort is bipartisan, having been introduced by committee chairman Mike Rogers (R-Michigan) and ranking member Dutch Ruppersberger (D-Maryland). The bill aims to promote greater information sharing between the federal government and U.S. businesses.

  • Making domain names safe and reliable

    DHS Science and Technology Directorate (S&T) says it is doing its part to make Web sites more secure and reliable by enhancing the Domain Name System (DNS), which translates Web-site names like science.com into a network address like

  • Disaster-proofing email servers for maximum resiliency

    On Tuesday Databarracks announced the launch of its Hosted Exchange solution, which allows companies to host email servers in a virtually indestructible location – a former U.K. Ministry of Defense bunker designed to protect critical systems in the event of a nuclear war

  • NERC CIP-compliant grid security reporting tool

    NERC CIP Standard is a comprehensive framework of physical and cyber security best practices to safeguard the bulk power system for North America; Skybox Security shows NERC CIP-compliant grid security reporting tool

  • Lockheed Martin UK opens its U.K. cybersecurity center

    Lockheed Martin UK has officially opened its first Security Intelligence Center (SIC) at Farnborough; the role of the SIC will be detection, identification, and response to information security incidents; this is accomplished by bringing together three primary capabilities: pervasive sensors, data management, and analyst collaboration

  • Both hackers and security vendors are embracing the cloud

    Large-volume hackers are now using the cloud for lucrative large-scale attacks, using public infrastructure to put at risk companies which adopt ambitious but poorly considered cloud-computing strategies. Even as they move to the cloud, too many companies simply move their security and reliability problems from the current infrastructure to the new one.

  • Top 5 influential IT security thinkers

    There are many tough challenges security professionals must contend with each day. This special section of SC Magazine focuses on people who represent the highest degree of professionalism in the IT security field, “individuals who stand out for their technical skills, managerial prowess, insight and advocacy.”

  • Congressional approval of cybersecurity bill looks promising

    Amid the partisan acrimony of the budget battles on Capitol Hill, the Obama administration and the Senate have made promising efforts to pass a sweeping cybersecurity bill in a rare show of bipartisan agreement; the bill is now at the top of the Senate’s agenda, and Senator Harry Reid (D – Nevada), the majority leader, said he plans to bring the bill to the floor during the first working session of 2012