background preloader

Topical ReTweets

Facebook Twitter

Opinion: Facilitator is needed for cybersecurity - Sen. Saxby Chambliss and Sen. Ron Johnson. There is widespread agreement across America that cybersecurity is an urgent national priority and the federal government needs to play a major role.

Opinion: Facilitator is needed for cybersecurity - Sen. Saxby Chambliss and Sen. Ron Johnson

The threat of a cyberattack is real, and its consequences could prove devastating to our economic and national security. Effective action cannot come too soon. Any solution to cybersecurity must allow the private sector, which owns 85 percent of our nation’s critical infrastructure, the freedom to use all tools at its disposal to protect against cyber intrusions. Hackers may bring down India’s power grids. Malware & cyber espionage, ongoing attacks on sensitive information. Dempsey, Brennan urge Senate to pass cybersecurity legislation. The Obama administration is unleashing a full court press for the Senate to pass cybersecurity legislation this week as the prospects for moving a bill before the August recess are flagging.

Dempsey, Brennan urge Senate to pass cybersecurity legislation

A pair of top defense officials on Wednesday argued that the legislation is needed to protect computer systems connected to critical infrastructure -- such as the electric grid or transportation systems -- from being hit by a crippling cyberattack. Does Cybercrime Really Cost $1 Trillion? National Security Agency Director Gen.

Does Cybercrime Really Cost $1 Trillion?

Keith Alexander speaks about cybersecurity and the new threats posed to the U.S. economy and military at the American Enterprise Institute in Washington, D.C., on July 9, 2012. Does Cybercrime Really Cost $1 Trillion? National Security Agency Director Gen.

Does Cybercrime Really Cost $1 Trillion?

Keith Alexander speaks about cybersecurity and the new threats posed to the U.S. economy and military at the American Enterprise Institute in Washington, D.C., on July 9, 2012. (Chip Somodevilla/Getty Images) These estimates have been cited on many occasions by government officials, who portray them as evidence of the threat against America. They are hardly the only cyberstatistics used by officials, but they are recurring ones that get a lot of attention. In his first major cybersecurity speech [1] in 2009, President Obama prominently referred to McAfee’s $1 trillion estimate. Project monitors price of stolen credit card data in real time. Google, eBay, Amazon, Facebook back new lobbying group.

Fedscoop. Michael Daniel, the new White House cybersecurity coordinator, said cybersecurity is a cross-cutting problem that affects not only federal agencies, but state and local governments, the private sector, non-governmental organizations, academia and international partners.

fedscoop

“It is a national security, homeland security, economic security, network defense, and law enforcement issue all rolled into one,” Daniel said in a White House blog post. Press Releases - News - U.S. Senate Republican Leader Mitch McConnell. Washington, D.C.– U.S.

Press Releases - News - U.S. Senate Republican Leader Mitch McConnell

Senate Republican Leader Mitch McConnell made the following remarks on the Senate floor today regarding the Democrat leadership blocking amendments from both sides of the aisle on the Cybersecurity bill—despite pledging to include “consideration of amendments” to the bill: How to Change Your Dropbox Password, and Make It Better. Dropbox is the latest tech company to have fallen victim to a security breach, and there's a good chance your account is at risk.

How to Change Your Dropbox Password, and Make It Better

But unlike recent hacks on sites such as Yahoo, LinkedIn and eHarmony, account names and passwords weren't posted online, making it more difficult to check via a tool if yours was compromised. The good news is that Dropbox has taken steps to notify affected users via email about the incident and have urged them to change their passwords immediately. The bad news is that just because you changed your Dropbox password doesn't mean other accounts that take the same password — from Facebook to Gmail — are safe.

Cyber Security Tools list 2012. This list is an collection of cyberwarfare and cybercrime tools.

Cyber Security Tools list 2012

Security tools that have been collected from the internet can be found here. Governments are increasing cyber security on social media. Many experts are sure, the new horizons of intelligence are in the social media and in the ability to control them.

Governments are increasing cyber security on social media

Governments are more careful on the analysis of social media and the vast amount of information which they hold. Intelligence agencies have learned that Social networks and forums are exceptional instruments for information gathering and to measure the global sentiment on every kind of argument, political as social. Last Week the Intelligence community veterans said at a panel discussion on open-source intelligence hosted by Government Executive. “We take a large look at the world and see if there’s a surprise out there,” said Patrick O’Neil, analytic director of the Open Source Center for the Office of the Director of National Intelligence. How Hackers Attack: Schools, Mom & Pops Vulnerable: Video. Cybersecurity Improves No Matter What Congress Does. Records and Data Manager Job Vacancy in London.

Records and Data Manager - Based in Maidenhead - Permanent - £39,735 Our client, through funding from Commonwealth countries and the MOD, ensure that records of war veterans are not forgotten by developing various programmes and working on projects throughout the world.

Records and Data Manager Job Vacancy in London

They are currently looking to recruit a Corporate Data Manager to provide information security to all records of a paper and electronic nature ensuring details are centralised and recorded correctly. The successful candidate will be required to provide all elements of data processing and record collection and archiving while producing policies and procedures to ensure that all records are fit for purpose.