Oxford portal to help coordinate global efforts in cybersecurity

From: SecurityAsia

By  Networks Asia staff

The first global online resource for building cybersecurity capacity has been launched Monday. The Cybersecurity Capacity Portal will help coordinate international efforts in cybersecurity through sharing of information and best practice, to support decisions and investments that can significantly enhance safety and security in cyberspace.


Sony hacked in February, knew about security flaws before data leak

From: NetworkWorld


As Sony leaks keep pouring in, it serves as a vivid reminder that even a company’s internal emails should include only what you want your mother to hear aloud in court, or your clients to read on the Internet

The Sony hack is a cross between a disastrous train wreck that you can’t turn away from and tabloid magazines – you know, the ones around checkout lanes that claim things like “aliens ate my baby.” But in this case, the tabloid headlines in mainstream media are grabbed from real internal emails.



Why OIRA Should Coordinate Federal Cyber Security Regulation

From: CircleID

By Bruce Levinson

Two quick facts about American industry’s resilience against cyber-attack, (1) our critical infrastructure is inadequately protected and (2) federal regulation will be required to fix the problem, reliance on market forces alone will not be sufficient irrespective of whether or not Sony Pictures survives. Although regulation is needed, it needs to be coordinated and, above all, cost-effective.

Which agency is charge of regulating cybersecurity? Right now, it’s a free for all with agencies staking out turf and claims of authority. The Federal Trade Commission (FTC) which does not have specific critical infrastructure protection responsibilities under either Presidential Policy Directive 21 (PPD-21) or the President’s Executive Order 13636 on improving cybersecurity, is among the most aggressive of agencies in asserting regulatory authority.


Hacktivism, Western cyber key threats for Mena

From: Trade Arabia

RIYADH, If 2014 was the “year of the breach,” then what future cyber security threats await us?  What’s the next mode of attack, and how much worse will it be?  Booz Allen Hamilton, a leading provider of management consulting, technology, and engineering services, examines the top cyber trends for 2015 impacting financial services in Mena.

Today, cyber security is a priority issue for every stakeholder in the financial services industry – investor, consumer, regulatory, employees – all the way up to boards of directors.  That makes the “tomorrow” question – how will the threat evolve? – all the more important. In the aftermath of the Arab Spring, the provision of strong and secure financial services for businesses and consumers is necessary to the nurture of political and social security to Middle East residents.


No more bids by telegram

From: FCW

So much for those singing bid proposals.

New rules prohibiting bid submissions via telegram and fax are part of a Dec. 4 memo from Federal Procurement Policy Administrator Anne Rung on procurement simplification.

Read Complete Article


Gov’t approves changes to critical infrastructure

From: Prague Post

Cyber security tops the list for improvements in amendment to official decree

Prague, Dec. 8 (ČTK) — The Cabinet today approved an amendment to the government decree on critical infrastructure, which will include information and communication technologies falling under cyber security as from Jan. 1, 2015, the Government Office press department has told Czech News Agency (ČTK).

On the same day, a new law on cyber security will take effect.

Critical infrastructure is a term describing production and nonproduction systems and services that are essential for the state’s security, for the economy, public administration and providing fundamental everyday needs of the inhabitants.


We are in a war with no boundaries, warns cyber security expert

From: The National

ABU DHABI // Effective defence of the nation’s cyberspace must take into account the possibility that attackers are not just nations or shadowy groups, a security expert has warned.

“In cyberspace there are no national boundaries, and attackers needn’t be a country or organisation,” said William Hagestad, a researcher in cyber security intelligence at Red Dragon Rising Publishing in the US. “They can be anyone with a computer, mouse and keyboard and the will to do harm.”


China’s bid for Internet influence

From: Straits Times

The country known for its great firewall champions respect for each country’s sovereign control of online space.

By Rachel Chang, In Beijing

The irony was lost on no one.

China’s inaugural World Internet Conference (WIC) last week in Zhejiang province had, as its slogan, “an inter-connected world shared and governed by all”.

This, from a country whose landmark cyberspace achievement has been to construct the world’s most elaborate and formidable firewall to block its citizens from the world.


Russia building a unified system to defend against cyber attacks

From: Russia Beyond the Headlines

Sergei Ptichkin

By the end of 2014, the Russian government plans to review a law on critical information infrastructure that would enable the country to build a comprehensive defense system against cyber attacks. Igor Sheremet, one of the co-authors of the bill and board chairman of the Governmental Military-Industrial Commission, gave an interview to talk about the initiative.

RBTH: What cyber defense system does Russia already have in its arsenal?


Sony Pictures Network Held Hostage by Unknown Hackers

From: Tom’s Guide


“If you don’t obey us, we’ll release data shown below to the world,” read an ominous image taken from a computer at Sony Pictures Entertainment today (Nov. 24), after a malicious hacker or hackers apparently attacked the company network.

Activity at Sony Pictures has reportedly ground to a standstill, with most employees’ computer screens replaced by an eerie picture of a skeleton overlaid with the title “Hacked By #GOP.”  The image, a photograph of which was posted to Reddit today by someone who claims a friend at Sony Pictures sent it to him, also claims that Sony Pictures’ “secrets” will be leaked online at 11 p.m. GMT tonight (6 p.m. EST).

Older posts «