-
DHS to tighten security of information included in national infrastructure plan
Infrastructure and IT companies are supposed to provide DHS with information to help fashion an effective infrastructure protection policy; these companies are worried about who would have access to that information
-
-
Protecting data over wide-area networks
For business to recover from disaster it has to have its data and applications protected; to do that effectively, both hardware and software encryptions are required, and both transmitted information and stored information should be proected
-
-
-
DHS buys 150,000 Camouflage CyberKeys
You can take it with you: DHS buys a nifty little device to help its work force be mobile and secure at the same time
-
-
Identity Systems shows upgraded identity search-and-match solution
Businesses are becoming more aware of the need to know exactly who their clients, suppliers, and employees are, so the upgrade to an already-popular search and identify solution will be welcomed
-
-
Emblaze acquires majority interest in secure information specialist Smart Content
Versatile communication security company acquires a content delivery company with sophisticated technology; beyond meeting consumer demand for more consumer-tailored contents, the system may be used for homeland security purposes
-
-
Emblaze acquires majority interest in secure information specialist Smart Content
Versatile communication security company acquires a content delivery company with sophisticated technology; beyond meeting consumer demand for more consumer-tailored contents, the system may be used for homeland security purposes
-
-
DHS funds effort to monitor vulnerabilities of open source code
Open source-based applications grow in popularity, and DHS decides to monitor more closely the security issues involved
-
-
-
RSA release preliminary fourth quarter results
On-line identity security company shows fourth quarter results
-
-
Amit Yoran named president, CEO of In-Q-Tel
Rising cyber security maven Yoran, with government and private sector experience, assumes leadership of CIA venture capital arm dedicated to promoting novel technologies
-
-
CSC, garnering fat contracts; is acquisition target
CSC should be an ideal acquisition target for Lockheed Martin, in the same way Anteon offered an attractive target for General Dynamics
-
-
NetClarity to use RSS for real-time reconfiguration of countermeasures to threats
Machine-readable RSS to be used to detect internet threats, disseminate the information, and instigate countermeasures
-
-
Civil Air Patrol uses instant messaging from IMLogic
Instant Messaging is not for teenagers only anymore. The Civil Air Patrol and other emergency services are beginning to use it to good effect
-
-
Arxceo signs first OEM agreement; market recognizes value of anomaly-based cyber defense
You may have received a call from your credit card company asking whether it was really you who purchased thousands of dollars worth of lingerie in Hawaii two weeks ago; why did they call you? Anomalous behavior, that’s why; now a similar same behavior-based defense is brought to corporate IT security
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.