Federal
SecurityWeek Extends ICS Cyber Security Conference Call for Presentations to August 31, 2020
August 12, 2020 Added by:InfosecIsland News
The official Call for Presentations (speakers) for SecurityWeek’s 2020 Industrial Control Systems (ICS) Cyber Security Conference, being held October 19 – 22, 2020 in SecurityWeek’s Virtual Conference Center, has been extended to August 31st.
Comments (0)
Cyberattacks a Top Concern for Gov Workers
March 03, 2020 Added by:Ionut Arghire
More than half of city and state employees in the United States are more concerned about cyberattacks than they are of other threats, a new study discovered.
Comments (0)
Rallies Planned at Apple Stores to Protest FBI's Backdoor Court Order
February 17, 2016 Added by:InfosecIsland News
Rallies planned at Apple stores nationwide to protest court order pressuring the company to build a “backdoor” for the FBI to hack the iPhone
Comments (0)
US Critical Infrastructures are Being Targeted by Actors in the Middle East – But Attribution is Difficult
November 19, 2015 Added by:Joe Weiss
The availability of ICS cyber exploits, and the lack of attribution, there should be more concern about the very viable cyber threat to our critical infrastructures.
Comments (0)
Challenges and Solutions of Threat and Vulnerability Sharing in 2015
June 29, 2015 Added by:Shawn Masters
Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection
Comments (0)
SCADA Systems Offered for Sale in the Underground Economy
June 22, 2015 Added by:Idan Aharoni
Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.
Comments (0)
Preview: Suits and Spooks London - May 6-7, 2015
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
Comments (0)
Suits and Spooks London: Register Now for Early Bird Rate
March 04, 2015 Added by:InfosecIsland News
Suits and Spooks London 2015 will be our first 2-day international event, and is jointly produced with techUK, an association of over 850 companies that's funded by the British government.
Comments (3)
Gemalto Presents Findings of Investigations Into Alleged Hacking of SIM Card Encryption Keys by GCHQ and NSA
February 25, 2015 Added by:InfosecIsland News
Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA)
Comments (4)
Suits and Spooks DC 2015: The Agenda - Last Chance to Register
January 29, 2015 Added by:Mike Lennon
Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.
Comments (2)
New Legislation on Threat Intelligence Sharing May Have a Chance
January 28, 2015 Added by:Anthony M. Freed
But the four cybersecurity legislation bills that were approved last month did not address all of the top concerns, namely the creation of an information-sharing platform that would enable better information exchange about cyber-based threats between the public and private sectors.
Comments (4)
State of the Union Advice to President Obama
January 20, 2015 Added by:Alan Cohen
Why the American government must play an essential role in catalyzing a national response to the emerging cyber crisis, business and private citizens can also take a leading role in safeguarding our data and preserving both our way of life and our commercial base. Here are 4 areas worth considering in the context of business.
Comments (4)
Treasury Imposes Sanctions Against the Government of The Democratic People’s Republic Of Korea
January 02, 2015 Added by:InfosecIsland News
In response to the Government of the Democratic People’s Republic of Korea’s numerous provocations, particularly the recent cyber-attack targeting Sony Pictures Entertainment and the threats against movie theaters and moviegoers, President Obama today signed an Executive Order (E.O.) authorizing the imposition of sanctions against the Government of North Korea and the Workers’ Party of Korea...
Comments (1)
The Security Industry and a Look Ahead
December 03, 2014 Added by:Art Coviello
I am cautiously optimistic about the prospects for collaboration and collective progress in the private sector as companies and industries are recognizing that in the digital world, no one is an island. We’re more like an archipelago and we’re starting to build bridges.
Comments (0)
First Victims of the Stuxnet Worm Revealed
November 11, 2014 Added by:InfosecIsland News
Kaspersky Lab today announced that after analyzing more than 2,000 Stuxnet files collected over a two-year period, it can identify the first victims of the Stuxnet worm.
Comments (0)
The Chinese Truly are Attacking our Critical Infrastructure
October 17, 2014 Added by:Joe Weiss
Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps