-
HP wins $47M contract to support HSPD-12 implementation
On Monday the U.S. General Services Administration (GSA) announced it had awarded Hewlett Packard a one-year contract worth as much as $47 million to support government-compliance with Homeland Security Presidential Directive-12 (HSPD-12)
-
-
Anonymous takes down DHS website in hacking spree
Last Friday the hacktivist group known as Anonymous momentarily took down DHS’s homepage along with several other high-profile attacks in a coordinated campaign
-
-
Ranking countries’ cyberattack preparedness
A new McAfee cybersecurity survey concluded that Israel, Finland, and Sweden are leading other countries in “cyber-readiness”; the report says that China, Brazil, and Mexico are among the least cyber-prepared to defend these countries’ networks against cyber attacks
-
-
Gender gap hinders cybersecurity hiring boom
As governments and private businesses clamor to hire computer experts, women are conspicuously missing from the employment boom; women account for over half the professional workforce, yet only 25 percent of information technology jobs are filled by females
-
-
Sandia addresses complex DNS vulnerabilities
A Sandia researcher has developed a visualization tool to help network administrators within the federal government and global IT community better understand Domain Name System Security (DNSSEC) and also help them troubleshoot problems
-
-
UMD, Lunarline partner on cybersecurity
The University of Maryland Cybersecurity Center will partner with Lunarline Inc. on cybersecurity education, research, and technology development
-
-
National Guardsmen, the new front line in cybersecurity
In an aggressive push to expand the military’s cyber warfare and defense capabilities, the National Guard has formed an increasing number of special cybersecurity units; National Guard cybertroops have proven to be particularly appealing solution, especially with defense cuts looming, as they cost less to train, maintain, and retain than active duty forces
-
-
Government outlines cybersecurity R&D priorities
The Obama administration recently unveiled its plan for government sponsored cybersecurity research and development programs
-
-
$3 million NSF grant for research into assured data provenance
The National Science Foundation supports funds new cyber security research into assured data provenance, the discipline of computer science concerned with the integrity and privacy of data sources, contents, and successive transformations
-
-
Cyber security measure requires more information sharing
The Cyber Intelligence Sharing and Protection Act of 2011 (H.R. 3523) made it through the House Permanent Select Committee on Intelligence on 1 December on a 17-1 vote. It is one of a dozen or so cyber security-related legislative initiatives proposed by lawmakers this year. The effort is bipartisan, having been introduced by committee chairman Mike Rogers (R-Michigan) and ranking member Dutch Ruppersberger (D-Maryland). The bill aims to promote greater information sharing between the federal government and U.S. businesses.
-
-
Making domain names safe and reliable
DHS Science and Technology Directorate (S&T) says it is doing its part to make Web sites more secure and reliable by enhancing the Domain Name System (DNS), which translates Web-site names like science.com into a network address like 1.2.3.4
-
-
Disaster-proofing email servers for maximum resiliency
On Tuesday Databarracks announced the launch of its Hosted Exchange solution, which allows companies to host email servers in a virtually indestructible location – a former U.K. Ministry of Defense bunker designed to protect critical systems in the event of a nuclear war
-
-
NERC CIP-compliant grid security reporting tool
NERC CIP Standard is a comprehensive framework of physical and cyber security best practices to safeguard the bulk power system for North America; Skybox Security shows NERC CIP-compliant grid security reporting tool
-
-
Lockheed Martin UK opens its U.K. cybersecurity center
Lockheed Martin UK has officially opened its first Security Intelligence Center (SIC) at Farnborough; the role of the SIC will be detection, identification, and response to information security incidents; this is accomplished by bringing together three primary capabilities: pervasive sensors, data management, and analyst collaboration
-
-
Both hackers and security vendors are embracing the cloud
Large-volume hackers are now using the cloud for lucrative large-scale attacks, using public infrastructure to put at risk companies which adopt ambitious but poorly considered cloud-computing strategies. Even as they move to the cloud, too many companies simply move their security and reliability problems from the current infrastructure to the new one.
-