Email Alerts
-
Black Hat: Poor SCADA systems security 'like a ticking time bomb'
An analysis of 120 security assessments at power plants, oil and chemical refineries and other critical systems revealed tens of thousands of security vulnerabilities, outdated operating systems and unauthorized applications. Article | 29 Jul 2010
-
Armorize's Huang cancels Black Hat China talk
A Black Hat 2010 presentation on the hacking community in China was canceled at the request of the Taiwanese government. Article | 15 Jul 2010
-
Perimeter defenses deemed ineffective against modern security threats
Targeted attacks like Operation Aurora require organizations to change up their security strategy, experts say Article | 30 Jun 2010
-
Attackers can take out critical infrastructure, but profit lies elsewhere, researcher says
A researcher heavily involved in studying the vulnerabilities in the systems that run power plants and other critical facilities, says a major disaster is unlikely. Article | 16 Jun 2010
-
Next Cyberstorm exercise to stress international cooperation on security
Philip Reitinger of the Department of Homeland Security, said international coordination on cybersecurity is paramount to avoiding a global crisis. Article | 15 Jun 2010
-
Cybersecurity legislation creates position with budgetary authority
New legislation aims to centralize cybersecurity coordination by creating a National Cyberspace Office and a cyberspace director who could review federal civilian agency budgets. Article | 10 May 2010
-
Stolen portable media device blamed in breach of 3.3 million
Educational Credit Management Corp. (ECMC), a major federal loan guarantor, blames a stolen portable media device for the data loss on approximately 3.3 million individuals. Article | 29 Mar 2010
-
Lawmakers, officials call for FISMA overhaul
FISMA, now far outdated with the advent of mobile computing and cloud services, would get an overhaul under newly proposed federal legislation. News | 25 Mar 2010
-
Experts see DNSSEC deployments gaining traction
Increased authentication at the DNS layer will block DNS cache poisoning and create new services, experts say. The Root domain should be signed and verified by July. Article | 10 Mar 2010
-
Three security themes to watch for at the 2010 RSA Conference
Endpoint security, virtualized environments and cyberwarfare could be big themes at the 2010 RSA Conference. Article | 02 Mar 2010
Security Management Strategies for the CIO