Sunday, June 28, 2009

Edition 1.2 Googled Security Events Corner

Google News Search

US Cyber Command: 404 Error, Mission Not (Yet) Found

Wired News - Noah Shachtman - ‎Jun 26, 2009‎

(Another: what does a recent and classified National Intelligence Estimate on cyber security recommend.) But already, there's tough talk in and around the ...

Video: Britain launches cyber-terror strategy

ITN NEWS

Britain says facing growing cyber security threat Reuters

Cyber-security strategy launched BBC News

all 481 news articles »

Seattle Post Intelligencer

Military Command Is Created for Cyber Security

Wall Street Journal - Siobhan Gorman, Yochi Dreazen - ‎Jun 23, 2009‎

Maren Leed, a cyber-security expert at the Center for Strategic and International Studies, said the military's closed computer networks could make it easier ...

Gates Creates Cyber-Defense Command Washington Post

New Military Command for Cyberspace New York Times

all 476 news articles »

Washington Post

OSCE ministers seek joint European security policy

eTaiwan News - Nicholas Paphitis, Elena Becatoros - ‎13 hours ago‎

AP AP AP AP European countries must cut through a tangle of conflicting policies to build a single voice on security, the Greek OSCE ...

FM on OSCE goals ANA

all 776 news articles »

InternetNews.com

Cyber Security's Centrality to Internet Issues Discussed At Google

BroadbandCensus.com - Douglas Streeks - ‎Jun 27, 2009‎

Christopher Painter, director of cyber security for the National Security Council emphasized the importance of cyber security as a national security ...

Feds Mulling Incentives for ... InternetNews.com

Wide-ranging changes might be sought for cybersecurity Nextgov

Network Shutdown Bill Faces Changes, Aide Says PC World

all 17 news articles »

GOOG

Cyber-security training mission not coming to Goodfellow

San Angelo Standard Times - ‎Jun 26, 2009‎

WASHINGTON — A cyber-security training mission isn't coming to Goodfellow Air Force Base, officials said Friday afternoon. Goodfellow had been in the ...

H1N1 flu case reported on Goodfellow Air Force Base San Angelo Standard Times

all 4 news articles »

Boston Globe

Ex-DHS Cyber Exec to Head ICANN

GovInfoSecurity.com - ‎Jun 26, 2009‎

Bernie Thompson, chairman of the House Homeland Security Committee; Motorola Chairman David Dorman; and Electronic Privacy Information Center Executive ...

Web IDs agency picks new chief Financial Times

Icann appoints new head honcho V3.co.uk

all 172 news articles »

Baltimore Sun

Md. poised to reap cyber security rewards

Baltimore Sun - ‎Jun 23, 2009‎

(Baltimore Sun photo by Lloyd Fox / June 11, 2009) Maryland technology companies that specialize in cyber security are expecting to reap the benefit of ...

Sourcefire Announces New Security Courses for Dissecting Threats ... Business Wire (press release)

Cyber security companies in Maryland getting hot, not bothered Baltimore Sun

all 15 news articles »

FIRE

Antivirus testing outfit: Microsoft Security Essentials makes the ...

TMCnet - ‎Jun 27, 2009‎

(Network World Middle East Via Acquire Media NewsEdge) Microsoft's free security software passed a preliminary antivirus exam with flying colors, ...

MSFT

CACI Raises FY 2009 EPS Guidance to $3.09 to $3.16 per Share and ...

MarketWatch - ‎Jun 25, 2009‎

We believe we are well-positioned to win new business in the administration's high priority areas of cyber security, information technology modernization, ...

CACI - OTC:CMTX

Security push must include computers

TheNewsTribune.com - ‎18 hours ago‎

She consults on cyber security and other national security matters but has no financial stake in the policies advocated here. She wrote this article for The ...

Google Blogs Search

The New School of Information Security (Repost)

10 hours ago by admin  
Adam Shostack, Andrew Stewart, «The New School of Information Security»Addison Wesley | ISBN: 0321502787 | 2008 | CHM | 288 pages ...
FileDownloadFullFileDownloadFull - http://www.filedownloadfull.com/
[ More results from FileDownloadFullFileDownloadFull ]

Information Security and Business Management: The History and ...

2 hours ago by admin  
Daniil M. Utin, MS, Mikhail A. Utin, Ph.D. Information Security and Business Management: The History and Reality of Misconceptions Preamble. We published an. ... New coming security consultant needed a PC on the local network with certain access to network shared drives. It took two months (!) to finally get all things settled. Computer alone took one (!) month to set up. We see here a magic number as two months is actually 60 or so days as in first case. ...
TAP | Tech A Peep - http://www.techapeep.com/ - References

Hackers turn gamekeepers for UK cyber security : Security Watch ...

26 Jun 2009 by Alan Harten  
Hackers turn gamekeepers for UK cyber security. Posted by Alan Harten on Friday, June 26, 2009 · Leave a Comment. The Government is using computer hackers who have reformed, in order to defend Britain and help the county guard against cyber ... attacks - the UK Office of Cyber Security to handle policy creations and international prosecutions and the UK Cyber Security Operations Centre which will assess and collate information about threats and possible counterattacks. ...
Security Watch - Internet Security News:... - http://www.securitywatch.co.uk/
[ More results from Security Watch - Internet Security News:... ]

Book Video Training: Advances in Information Security and ...

19 hours ago by Shytex  
Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Lecture ... Computer Science / Security and Cryptology): Jong Hyuk Park, Hsiao-Hwa Chen ...
Book Video Training - http://www.booktraining.net/ - References
[ More results from Book Video Training ]

First Cyber Security Measures Unveiled | TTKN News

27 Jun 2009 by admin  
The Prime Minister said the UK's first national Cyber Security Strategy paves the way for extra funding and new measures to help detect cyber attacks. The. ... Mr Brown said the internet and the flow of information has risen dramatically around the world, which has in turn increased the risk. ?Some terrorist groups are using the internet in a wholly exploitative way and of course we have got to beware of any threats to our country.? The PM added: ...
TTKN News - http://www.ttkn.com/ - References

Open Rights Group Newsblog : Blog Archive » PM announces Office of ...

9 hours ago by Glyn  
The PM said an Office of Cyber Security will be formed, and a Cyber Security Operations Centre will provide coordinated protection of critical IT systems from Cheltenham. Mr Brown said the internet and the flow of information has risen ...
Open Rights Group Newsblog - http://www.openrightsgroup.org/newsblog/ - References

Internet Security Alliance Updates 6-23-09 : Information Security ...

23 Jun 2009
The Department of Homeland Security (DHS) Office of Cybersecurity and Communications (CS&C) National Cyber Security Division (NCSD), the Department of Defense (DoD) and National Institute for Standards and Technology (NIST) Information ...
Infosec Update - http://news.mandalorian.com/
[ More results from Infosec Update ]

Schneier on Security: Workshop on Economics of Information Security

24 Jun 2009
June 24, 2009. Workshop on Economics of Information Security. I'm at the 8th Workshop on Economics and Information Security at University College London (field trip to see Jeremy Bentham). Ross Anderson is liveblogging the event. ...
Schneier on Security - http://www.schneier.com/blog/ - References
[ More results from Schneier on Security ]

Time for a Cyber NonProliferation Treaty? – Ariel Silverstone's ...

12 hours ago by Ariel  
This is the blog of Ariel Silverstone, a globally recognized expert in the fields of risk management and information security. ... In contrast to the need to process, create, and securely store ordnance or dual-use items, where the case is Cyber warfare, any and every computer can be, and sometime is, an "instrument of war". Only in very controlled societies, such as Russia or Iran, can access to computing infrastructure be so restricted as to carefully control who, when, ...
Ariel Silverstone» Ariel Silverstone –... - http://arielsilverstone.com/
[ More results from Ariel Silverstone» Ariel Silverstone –... ]

Affordable Web Hosting Information: Website Security Rules Explained

11 hours ago by Affordable Web Hosting Information  
Website Security Rules Explained. 2006-2007 has been the years that online shopping has come into its own with online consumers spending a record $65.1 billion in merchandise via the web. More and more people are getting comfortable ...
Affordable Web Hosting Information - http://webgatehosting.blogspot.com/

No comments:

Post a Comment

My Blog List