bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
10:34 am, April 19, 2014

Search Result

Search Tags:  cyber security

The 2014 Big Picture on Cyber Security

Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity.

This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.

Tags: TIBCO , technology , Frank Konieczny , Rod Turk , Matt Quinn

Wednesday - 02/19/2014, 11:19am EST
Listen

China forms cyber security department

Chinese President Xi Jinping, according to the Associated Press, "has put himself in charge of a new body to coordinate cyber security, in a sign of Beijing's concern over its vulnerability to online attacks and its desire to retain tight control over the Internet." AP says Chinese state media reports the central Internet security and information leading group will draft policy for boosting the country's defenses, as well as expanding and improving Internet access.

Tags: The Cyber Security Report , J.J. Green , UMUC ,

Monday - 03/03/2014, 09:37am EST

Bitcoins Disappear

The Mt. Gox bitcoin exchange in Tokyo filed for bankruptcy protection Friday and its chief executive said 850,000 bitcoins, worth several hundred million dollars, are unaccounted for. The exchange's CEO Mark Karpeles appeared before Japanese TV news cameras, bowing deeply. He said a weakness in the exchange's systems was behind a massive loss of the virtual currency involving 750,000 bitcoins from users and 100,000 of the company's own bitcoins. That would amount to about $425 million.

Tags: The Cyber Security Report , UMUC , J.J. Green ,

Monday - 03/03/2014, 09:34am EST

Banks and retailers bury the hatchet on Cyber

U.S. banks and retail groups say they are joining forces to work on cyber security, getting past recent finger pointing for data breaches. The Financial Services Roundtable, Retail Industry Leaders Association and several other trade associations said the new partnership would focus on sharing more information on cyber threats.

Tags: UMUC , J.J. Green , The Cyber Security Report ,

Friday - 02/14/2014, 04:27pm EST

Mixed Messages for NSA

Utah lawmakers are sending mixed messages to the National Security Agency, which runs a massive data-storage warehouse outside of Salt Lake City. One proposal is calling for legislators not to collect utility taxes from the center. Meanwhile, another lawmaker wants to cut off water to the center, which uses more than 1 million gallons daily to cool its computer processers.

Tags: UMUC , J.J. Green , The Cyber Security Report ,

Friday - 02/14/2014, 04:25pm EST

FINRA reviewing security

The Financial Industry Regulatory Authority is looking at the measures that Wall Street's brokerages take to protect their businesses and customers from cyber security threats. FINRA, which conducts periodic "sweeps," or targeted checks on Wall Street brokerages, says it is conducting the review, in part, because of the growing threat to information technology systems from "a variety of sources.

Tags: J.J. Green , UMUC , The Cyber Security Report ,

Monday - 02/10/2014, 08:46am EST

Bank Customers Targeted in scam

App River email and security experts says Bank of America customers have been targeted by a new virus campaign they're calling a Bredo virus. It comes in the form of phishing email that claiming to be from BofA and asking the recipient of download a security file. The main goal of this virus is to steal information such as banking info or recording keystrokes. The software may also have abilities to further infect a system by downloading more malware on to the machine.

Tags: UMUC , J.J. Green , The Cyber Security Report

Monday - 02/10/2014, 08:44am EST

Cyber Security languishes during shutdown

Cyber security advocates are frustrated that new legislation is caught between a rock and a hard place. It's stuck in contentious debates over government surveillance and the government shutdown. NSA's highly skilled cyber workers have been told to stay home, weakening the nation's ability to protect critical cyber infrastructure. Thousands of people with PHDs and math whizzes and thousands of computer scientists have been sitting idly at home.

Tags: The Cyber Security Report , cybersecurity , UMUC , J.J. Green

Tuesday - 10/15/2013, 10:15am EDT

Hackers can do more than snoop

Homeland Security News is reporting that if hackers can steal a company's top-secret data, they can just as easily destroy a company's network. Richard Bejtlich, chief security officer for Mandiant, a cyber-security company, said not only are hackers getting into networks to steal huge amounts of intellectual property but they can also permanently erase data.

Tags: UMUC , The Cyber Security Report , cybersecurity , J.J. Green

Tuesday - 10/15/2013, 10:18am EDT

France upset with the NSA

The U.S. National Security Agency swept up 70.3 million French telephone records in a 30-day period, according to a newspaper report Monday that offered new details of the massive scope of a surveillance operation that has angered some of the country's closest allies. The French government summoned the U.S. ambassador for an explanation on Monday and renewed demands for talks on protection of personal data, as well as pledges that the surveillance would cease.

Tags: cybersecurity , The Cyber Security Report

Monday - 10/21/2013, 02:33pm EDT
  • 1
  •