Computerworld - John Brennan, who was nominated by President Barack Obama today to be the director of the Central Intelligence Agency, has been a vocal advocate for federal cybersecurity legislation in recent months. As the ...
Tags: cybersecurity legislation, Obama, cyberattacks, cybersec regulations
IDG News Service - The U.S. is facing a dramatically increasing threat from cyber attacks and a future attack on the country's critical infrastructure could have an effect similar to the Sept. 11 terrorist attacks of 2001, the U.S. ...
Tags: cyber attacks, critical infrastructure, Internet, cyber security, US
BT is to extend its cyber security agreement with the Ministry of Defence (MOD) in a deal that will see the company expand its cyber defence service. BT said work had already begun on the seven-year agreement that builds on an existing ...
The government has today released documents detailing what it sees as highlights in the UK Cyber Security strategy it put into place last year, and its plans for the future. It has also detailed how much money is expected to be spent in ...
Tags: UK, cyber, security, government
US intelligence officials say there is growing evidence Iran was behind recent cyber attacks that disabled computers across the Saudi oil industry. These attacks contributed to a warning last week from Defense Secretary Leon Panetta that ...
Tags: Iran, cyber attacks, oil industry, disabled computers
wo monolithic buildings in lower Manhattan that serve as major network hubs for the U.S. are operating on generator power, thanks to Hurricane Sandy. The buildings, known as carrier hotels, are a 2.9 million square foot structure at 111 ...
Tags: U.S., network hubs, generator power, Hurricane Sandy
Companies must take responsibility for cyber security at board level to tackle the exponential growth in attacks, the government has urged. The warning comes as ministers launch a Cyber Security for Business booklet to encourage company ...
This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember, as I mentioned previously, "C-level executive" and ...
Tags: interviews, cyber security, privacy, business, government, web security
The U.S. government needs a comprehensive doctrine addressing cybersecurity instead of the current patchwork of policies and agencies dealing with cyberthreats, according to a group of experts. The lack of an overarching cybersecurity ...
Tags: U.S.government, cybersecurity, cyberthreats, experts
The most popular bingo site on cyberspace, 123Bingoonline has planned three different giveaways including raffles to win Gift bags, BB's and even an entire bingo room, named after one of the lucky players that participate in the promotion. ...
Once a high-flying web property, Digg was sold Thursday for a paltry $500,000. The sale to Betaworks, maker of an iOS news aggregator app and an URL clipper, Bit.ly, was a fraction of the $45 million lavished on the venture by Silicon ...
Tags: web property, Digg, iOS, aggregator app, URL clipper
The cost of protection against cyber crime can far exceed the cost of the threat itself, a Cambridge University-led international study has concluded. The first systematic study of the cost of cyber crime recommends that less should be ...
Tags: cyber crime, anti virus software, network, cyber safety
A Russian man has been arrested in Cyprus on charges that he launched denial-of-service attacks on Amazon.com and eBay in 2008, the U.S. Department of Justice announced. Dmitry Olegovich Zubakha, 25, of Moscow, was arrested Wednesday, the ...
Tags: Russian man, Cyprus, attacks, Amazon.com, eBay
A cyber security think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply. The manual comes from experts working with the ...
Tags: cyber attacks, cyber security, cyber warfare, cyberspace, nternational law
The U.S. Air Force is openly soliciting technologies that would improve its capability of launching cyberattacks and gathering intelligence during cyberwarfare operations. "The Air Force Life Cycle Management Center invites concept papers ...
Tags: U.S., Air Force, soliciting technologies, cyberwarfare capabilities