-
Canada emergency response system requires CPR
So says a review of the recent Cyber Storm exercise; poor communications and data access cited as major concerns
-
-
ITSCC, ITGCC to coordinate their activities more closely
A group represneting companies active in the IT sector and an assoication of government departments and agencies relying on the services ofthese comoanies, will coordinate their activities more closely
-
-
Army considers creating a cyber command
Move would follow a recent Air Force decision to do the same; Army pays a visit to Barksdale Air Force Base to explore options
-
-
DoE inspector general raps agency's computer management system
Twenty desktop computers containing classified information are missing; another seventy-four lacked proper labeling
-
-
Army considers creating a cyber command
Move would follow a recent Air Force decision to do the same; Army pays a visit to Barksdale Air Force Base to explore options
-
-
Information Security announces IT Readers' Choice awards
Joint project with SearchSecurity.com recognizes forty-five industry leaders of today and tomorrow
-
-
Hacker gang warfare on the rise
Bot herders fight one another for market share; Storm worm instructed computers to attack the wily Warezov gang
-
-
Solving the cognitive-radio problem in the analog domain
Georgia Tech researchers awarded $3.5 million to develop tiny analog chips to scan RF bands for open channels
-
-
Qwest, AT&T, and Verizon win deal of the decade
Three telecoms win the Networks Universal contract, worth up to $48 billion over ten years; Sprint Nextel big loser
-
-
IT security firms ready for an IPO boom
Lackluster market shows signs of life with four large companies preparing to go public; “public exit opportunities” available for the right firms, say experts
-
-
IXEurope finishes strong at Data Centre Europe Awards 2007
Company recognized as best in disaster recovery service, datacenter management; Attenda and BladeLogic received much-deserved recognition
-
-
Battle over allocation of the 700MHz band looms
TV operators will soon vacate the 700 MHz band, and the FCC is getting set to auction it; pressures grow to allocate portion of the band for public safety uses
-
-
IDF to issue tender for second generation of proprietary wireless network
The Israeli army has developed a propietary, encrypted wireless network; trouble is, it leaves much to be desired
-
-
The Real ID Act poses serious challenges
The Real ID Act mandates that by May 2008, states must include biometric information in the driver licenses and equip these lcienses with RFID technology; this de facto national ID will be a boon to technology companies which manufature and sell systems to support digital ID, authentication, or encryption, but it may well also be a gift to hackers, criminals, and terrorists
-
-
RFID disputes prompts DHS investigation
Black Hat conference atwitter after HID prevents IOActive from disclosing its tags’s vulnerability; DHS’s Computer Emergency Response Team will take a closer look at the issue
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.