Blog Posts Tagged with "DHS"

94ae16c30d35ee7345f3235dfb11113c

The US Cyber Guard Begins

May 17, 2012 Added by:Joel Harding

US cyber defenses will now include more than just the US Cyber Command and the Department of Homeland Security. Eventually it may include somewhere around 8,000 contractors, mostly defense contractors. Of course the conspiracy theorists will begin screaming “big brother”...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Comments on DNSChanger Malware Deadline

May 09, 2012 Added by:Headlines

Please act now. The clean servers maintained by the private sector in coordination with the FBI will expire on July 9, 2012. Internet users who have the DNSChanger malware and whose IS) has moved them to one of the clean servers, may not have access to the Internet after this date...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

US Cybersecurity Capability: National Preparedness Report

May 07, 2012 Added by:Plagiarist Paganini

Cybersecurity is identified as a priority issue to enhance the efficiency of prevention and incident response. The report invites federal and private sector partners to accelerate initiatives to enhance data collection, detect events, raise awareness, and respond to incidents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS: Industrial Control Systems Threats Increasing

May 03, 2012 Added by:Headlines

“We pay particular attention to industrial control systems. We’re seeing a troubling increase in the threats and the vulnerabilities associated with those. But we are making progress on that, I think,” DHS deputy undersecretary for cybersecurity Mark Weatherford said...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: The Role of Fusion Centers

May 03, 2012 Added by:Infosec Island Admin

ICS-CERT recommends that industrial control systems owners and operators contact their local fusion center to better understand the role of their fusion center in supporting the private sector in critical infrastructure protection and cybersecurity...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

National Collegiate Cyber Defense Competition (NCCDC)

May 01, 2012 Added by:Infosec Island Admin

"The Department of Homeland Security is proud to be one of the sponsors of this competition that took place over the course of three days and focused on the operational aspects of securing and defending a 'commercial' network infrastructure..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mike Locatis Named Assistant Secretary for Cybersecurity

April 25, 2012 Added by:Headlines

DHS announced the appointment of Michael W. Locatis III as the new Assistant Secretary for Cybersecurity and Communications (CS&C) at the National Protection and Programs Directorate. Locatis brings a wealth of experience in information management, cybersecurity and public safety...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cybersecurity Problems Found in Electrical Infrastructure

April 07, 2012 Added by:Joel Harding

DOE is in charge of locating and fixing critical infrastructure problems within the energy sector. Do they, in turn, report to DHS if it has to do with critical infrastructure? Does DHS oversee DOE’s cybersecurity problems, their critical infrastructure problems or...?

Comments  (2)

69dafe8b58066478aea48f3d0f384820

DHS: Don’t be Fooled by Too Good to be True Websites

April 03, 2012 Added by:Headlines

According to a recent report, the fan craze created by the film The Hunger Games has created the perfect opportunity for devious cybercriminals to take advantage of Internet users. While clicking on a link may seem innocent enough, it can actually infect your device...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

What is Aurora and Why is it a Risk to Grid Reliability?

March 29, 2012 Added by:Joe Weiss

Aurora is a gap in the protection of the electric grid. It is a basic physics property - an out-of-phase condition that cannot be seen by the operator and can NOT be addressed by traditional mitigation. The only means to prevent an Aurora event is by physical hardware mitigation...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Are DOE and DHS Helping to Secure the Infrastructure or Not?

March 08, 2012 Added by:Joe Weiss

DOE and the utilities are in an effort to secure the Grid. Yet the utilities voted down Version 5 of the NERC CIPs. Many of the devices that have been demonstrated to be vulnerable would not be addressed by NERC. Who is responsible for protecting critical infrastructure?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS's Mark Weatherford on the Cybersecurity Act of 2012

February 23, 2012 Added by:Headlines

"The proposed legislation would enable DHS to be more effective and efficient in its protection of federal networks by clarifying DHS’ authorities in this space and enabling better sharing of cybersecurity information from other federal agencies to DHS..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US and Netherlands Expand Cybersecurity Coordination

February 22, 2012 Added by:Headlines

The Letter of Intent recognizes expanded coordination between the US and the Netherlands, and outlines several areas to further collaborate on cybersecurity including incident management and response activities, control systems security, and cybersecurity exercises...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Is ICS-CERT Focused on the Right Issues?

February 21, 2012 Added by:Joe Weiss

Analysis of the incident database shows the most significant events from an impact perspective were control system related - yet they represent only 24 of the 203 advisories ICS-CERT put out in the last year. It appears ICS-CERT is focusing on the less important issues...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

The Obama Administration’s Cybersecurity Proposal

February 13, 2012 Added by:Headlines

The President’s proposal would establish national standards, protect federal networks, and allow DHS to provide enhanced voluntary assistance to our private sector and state, local, tribal, and territorial government partners...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Draft Guidance for Monitoring IT System Security

January 26, 2012 Added by:Headlines

Three new draft reports published by the NIST are designed to help both public and private organizations improve the security of their information management systems by developing capabilities for continuous monitoring of security...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »