Summary: Recognizing that the national and economic security of the United States depends on the reliable functioning of critical infrastructure, the President under the Executive Order “Improving Critical Infrastructure Cybersecurity” has directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure. The Framework will consist of standards,...Read More
Organizations concerned with Mobile Device Security have new guidelines from the National Institute of Standards and Technology (“NIST”), which released an update of its 2008-era special publication to reflect the tremendous growth of mobile devices since: Guidelines for Managing the Security of Mobile Devices in the Enterprise (SP 800-124r1))(the “Mobile Guidelines”). The Mobile Guidelines are designed to go hand-in-hand with...Read More
If your company uses the Internet to share information, you may consider amping up your cybersecurity. According to a recent IBISWorld report, 10 growing industries will increasingly depend on cybersecurity services—ranging from data encryption to protection from malware—within the next five years. Industries include the following: Online Payment Processing Software Developers Virtual Data Rooms Online Insurance Brokers IT Security Consulting Operating Systems and Productivity Software...Read More
According to The Hill.com, “The White House is poised to release an executive order aimed at thwarting cyberattacks against critical infrastructure on Wednesday, two people familiar with the matter told The Hill. The highly anticipated directive from President Obama is expected to be released at a briefing Wednesday morning at the U.S. Department of Commerce, where...Read More
The National Institute of Standards and Technology (NIST) is requesting comments on the final public draft of Security and Privacy Controls for Federal Information Systems and Organizations, Special Publication (SP)800-53, Revision 4. The document, two years in the making, is the latest revision to a document that is considered the principal catalog of security safeguards and...Read More
Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. More than 40 bills and resolutions with provisions related to cybersecurity have been introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of...Read More
Hackers school next generation at DEFCON Kids: “San Francisco (AFP) June 25, 2011 – DEFCON hackers will share their skills with the next generation at a first-ever children’s version of the infamous gathering of software renegades, lock pickers and social engineers. DEFCON Kids will take place in Las Vegas on August 6-7 during the 19th annual...Read More
Booz Allen’s Mike McConnell appeared on “60 Minutes” to discuss whether nation states or others with ill intent could get into the computer systems that run crucial elements of the US infrastructure, such as the power grids, water works, or the nation’s banking system. view now »Read More
Secretary Napolitano’s Testimony on “Eight Years after 9/11: Confronting the Terrorist Threat to the Homeland” from DHS | National Cybersecurity Division Testimony of Secretary Napolitano before the Senate Committee on Homeland Security and Governmental Affairs, “Eight Years after 9/11: Confronting the Terrorist Threat to the Homeland” (Written Testimony) given September 30, 2009 at the Dirksen...Read More
Recent Comments