IDG News Service - Prince George's Community College in Maryland will use a $5 million grant from the U.S. National Science Foundation to address a major concern in cybersecurity circles, that the U.S. isn't producing enough qualified ...
Proposed laws could protect virtual intellectual property. A number of Internet laws that aim to protect intellectual property rights online have been proposed in recent months. While only one piece of legislation has passed, proposed ...
Tags: Business Implications, Computer Products, Cyber Legislation
Organizers played "Eye of the Tiger" and "We are the Champions" over the loudspeakers as participants in the SANS Institute's NetWars Tournament of Champions sat down at their laptops and prepared for action. About 200 cybersecurity ...
Tags: SANS Institute, NetWars, Cybersecurity, Peers
Online dating site eHarmony has also been hit by the theft of millions of passwords,some of which professional networking site LinkedIn confirmed corresponded to members'accounts. The confirmation came after reports that 6.5 million ...
IT Governance Ltd, a leading cybersecurity management service provider, is warning organisations that they are exposed to ever greater risks resulting from new Internet-based threats being launched faster than ever. IT Governance Ltd, a ...
Tags: Web Based Applications, Productivity, Security, Computer Products
The U.S. Senate has voted against moving forward on a cybersecurity bill that supporters have called critical for national security. The Senate late Wednesday voted 51-47 to end debate and move toward a final vote on the Cybersecurity Act ...
The head of the US National Security Agency (NSA) and Cyber Command, created to defend against internet-based attacks, has called on hackers to help make the web more secure. General Keith Alexander emphasised the common ground between US ...
Tags: hackers, National Security Agency, US, internet-based attacks
If you don't know, you need a better connection to your company's risk managers, who measure risk by what can be insured and what it costs to do so. While the measurement of operational risks is still a bit of a puzzle for CSOs, risk ...
Tags: TCOR, CSOs, risk managers, total cost of risk
Groups of companies in the same industry could mitigate the effects of cyberattacks by pooling infrastructure resources and working together on security issues, a senior official in the U.S. Department of Homeland Security has suggested. ...
Tags: DHS Official, IT Resources, Hacks, cyberattacks
The U.N.'s International Telecommunications Union should embrace free and open broadband markets and allow individual countries to reform their telecommunications regulations instead of attempting to centrally regulate the industry, the ...
Tags: U.N., ITU, telecommunications regulations, U.S.delegation
The UK national Cyber Security Challenge has launched another competition aimed at addressing a critical Linux security skills gap. The majority of internet infrastructure is based on Linux, but Linux is rarely taught in schools and Linux ...
Tags: Cyber Security Challenge, critical Linux, internet infrastructure
The Obama administration "strongly supports" a new cybersecurity bill scheduled to be debated on the Senate floor soon, even though some of its provisions are watered down from earlier legislation, the White House Office of Management and ...
Tags: The Obama administration, supports, cybersecurity bill, the Senate
IDG News Service - In order to keep hackers at bay there must be changes in security budgets and privacy regulations, RSA Executive Chairman Art Coviello said on Tuesday. Coviello opened the RSA Conference Europe 2012 with a keynote that ...
Tags: Coviello, hackers, security budgets, privacy regulations, RSA
Computerworld - A senior Democratic lawmaker is urging President Barack Obama to issue an executive order aimed at protecting the nation's critical infrastructure against cyber threats. In an open letter to the President on Tuesday, Sen. ...
Tags: infrastructure, US, cyber threats, computer network
IDG News Service - The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. The Commission released an online tool called the "Smartphone ...
Tags: FCC, security advice, smartphone, mobile devices.data