bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
6:26 am, August 29, 2014

Search Result

Search Tags:  The Cyber Security Report

Jurors held in contempt

Two London men have each been sentenced to two months in jail following contempt of court convictions for misusing the Internet while serving on a jury. One of them posted a Facebook message while the other used Google to search for extra information about the victims of a fraud case and later shared the information with other jurors. A 2010 UK survey by the Guardian found that about 12 percent of jurors involved in high-profile cases had supplemented courtroom evidence with Web searches.

Tags: UMUC , cyber security , cybersecurity , J.J. Green

Monday - 08/05/2013, 10:58am EDT

U.S. Cyber Industry takes lead

Both the White House and Congress have asserted that protecting the nation's resources from cyber-attacks is a top priority. Techworld is reporting enacting legislation designed to enhance security for critical infrastructure components such as water, power, telecom and transport facilities that is acceptable to both political parties has been a struggle. The problem political differences. But Cyber industry leaders have started to work on a voluntary standards and best practices platform to provide some level of security.

Tags: UMUC , J.J. Green , cyber security , cybersecurity

Monday - 08/05/2013, 10:55am EDT

Wall Street Conducts cyber drill

Cyber-attacks on banks are growing more frequent. Wall Street has just conducted a cyber-defense exercise called "Quantum Dawn 2,". During the drill, bank employees were stationed at their normal offices, and were emailed throughout the day with bits of information that could indicate an encroaching hacker attack. They monitored a simulated stock exchange for irregular trading and were pressed to figure out what was going on and how to react while sharing information with regulators and each other.

Tags: cybersecurity , cyber security , J.J. Green , UMUC ,

Thursday - 07/18/2013, 01:23pm EDT

Center watches cyber threats

Ever hear of the Multi-State Information Security and Analysis Center? It's a division of the Center for Internet Security. Their focus is cyber threat prevention, protection, response and recovery for state, local territory and tribal governments. Their objectives iclude providing two-way sharing of information and early warnings on cyber security threats, dissemination of information on cyber security incidents, to promote awareness and coordinate training.

Tags: cybersecurity , cyber security , J.J. Green , UMUC ,

Thursday - 07/18/2013, 01:20pm EDT

Cyber warriors are targets

Will exploit developers become potential targets of state-sponsored assassinations in the future -like the nuclear scientists in recent times? There's been some discussion in the "Tech" community regarding the legitimacy of using lethal force against civilian hackers. As a result some are wondering what the future might hold for exploit developers and other members of the cyber supply chain who are facilitating state-funded, offensive cyber operations.

Tags: cyber security , cybersecurity , J.J. Green , UMUC ,

Thursday - 07/18/2013, 01:19pm EDT

What are hackers after

We hear a lot about zero-day attacks and system vulnerabilities, but most hackers look for easier enterprises like the application used to access the Web. That's the one most online attackers will target. Why? Because most attackers and online exploit kit designers realize that the common browser is usually an endpoint's weakest link. Not only are enterprises generally slow to keep up with browser patching, they're downright sluggish at updating plug-ins and extensions.

Tags: cyber security , cybersecurity , J.J. Green , UMUC ,

Thursday - 07/18/2013, 01:17pm EDT

Section

Tags: cyber security , cybersecurity , J.J. Green , UMUC ,

Tuesday - 07/09/2013, 03:31pm EDT
  •  
  • 6