On November 4 and 5, the National Institute of Standards and Technology (NIST) will host the Cloud Computing Forum and Workshop II to give government and industry stakeholders opportunity to comment on the next steps in developing cloud computing standards.
McAfee, Inc. recently released new research, finding that mid-sized organizations have seen increased attacks on their networks and systems since last year, according to the McAfee report The Security Paradox.
The online web service had over 205,128 people who performed vulnerability scans and out of those scans over 40,221 registered in a 4 day period.
Insecure Web browsers and the growing number of complex applets and browser plug-in applications are allowing malicious software to spread faster than ever on the Internet. Some websites are installing malicious code, such as spyware, on computers without the user’s knowledge or consent.
The Department of Homeland Security recently launched the “Stop. Think. Connect.” public cybersecurity awareness campaign -- a national initiative that promotes simple steps the public can take to increase their safety and security online.
During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the "Top Producer of Spam" title. Based on the Trend Micro semi-annual 2010 threat report, spam continued to grow between January and June 2010, with a brief lull during April.
As we go about our day, preoccupied with work, family, friends and activities, many of us have the luxury of never thinking about cyberwarfare. But know that right this second, more than 100 foreign intelligence organizations are trying to hack into our military networks. A scary thought, isn’t it? To defend our nation against this threat, the Pentagon is partnering with NATO allies and the private sector.
- By Sherleen Mahoney
- Oct 01, 2010
Citrix Systems Inc. recently announced key findings from a recently conducted survey on the impact of government cybersecurity measures on federal managers.
Most people in the industry are familiar with how the NVR has changed the face of security video projects worldwide. As security hardware professionals, you may have been asked, “Aren’t NVRs just servers?” or “Can we use one of our extra e-mail machines as an NVR?” You might answer with a reserved, “Yes, but....”
- By William Ferris
- Oct 01, 2010
PandaLabs, Panda Security's antimalware laboratory, recently published its Q3 Quarterly Report on global malware activity, covering security events and incidents from July to September. Continuing the theme from the last report, PandaLabs once again found Trojans in the spotlight, comprising 55 percent of all new threats. Infection via e-mail, traditionally the most popular vector for spreading malware, has declined in favor of greater use of social media. These include clickjacking attacks using the Facebook "Like" button, fake Web pages positioned on search engines (BlackHat SEO) and zero-day vulnerability exploits.
Department of Homeland Security (DHS) Secretary Janet Napolitano recently announced the beginning of Cyber Storm III -- a three-day long, DHS-sponsored exercise that brings together a diverse cross-section of the nation’s cyber incident responders to assess U.S. cyber response capabilities.
CDW LLC, a provider of technology solutions to business, government, education and healthcare, recentlyannounced the results of its Business Continuity Straw Poll, based on a survey of 200 Information Technology (IT) decision makers at medium and large U.S. businesses, each of which experienced significant network disruptions since July 2009.
Panda will train the Army's operational agents in the fight against cyber terrorism, digital crime and strategic preparation for cyber-warfare.
McAfee Inc. recently revealed that business leaders worldwide see the value of Web 2.0 in supporting productivity and driving new revenue -- but remain deeply concerned about security threats associated with deploying the technology.
Independent test lab, Broadband Testing, and test and measurement leader, Spirent Communications, achieved a significant breakthrough in securing virtual environments and allaying user fears about cloud based applications.
Waterfall Security Solutions, provider of Unidirectional Security Gateways, announced recently the successful completion of a security assessment, undertaken by the Idaho National Laboratory, of Waterfall's Unidirectional Security Gateway's technology and products. The assessment was conducted as part of the Department of Homeland Security Control Systems Security Program (CSSP).
Qualys Inc., provider of on demand IT security risk and compliance management solutions, recently announced the release of the “Top Cyber Security Risks Report.” This second annual report features new data from HP TippingPoint DVLabs, SANS Institute and Qualys Research Labs, helping companies understand the latest security threats and implement security policies and technologies to protect company data.
HP and ArcSight Inc. recently announced that they have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of $1.5 billion.
PandaLabs, Panda Security's anti-malware laboratory, has discovered that hackers are creating 57,000 new websites each week that exploit approximately 375 high-profile brand names worldwide at any time. These findings are based on a three-month long study conducted by PandaLabs of its global malware database. Notably, eBay and Western Union-related URLs comprise 44 percent of all malicious sites, with Visa, Amazon, Bank of America and PayPal also heavily targeted by cybercriminals.
The National Institute of Standards and Technology (NIST) issued recently its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.