Cybersecurity and...
Follow
857 views | +0 today
 
Scooped by Jose Ramon Coz
onto Cybersecurity and Technology
Scoop.it!

NSA's Michael Rogers on Facial Recognition, Cybersecurity

June 3 (Bloomberg) -- Admiral Michael S. Rogers, director of the National Security Agency and commander of the U.S. Cyber Command, talks about cybersecurity, tools to combat terrorism and the...
more...
No comment yet.
Cybersecurity and Technology
Interesting News, Videos and Reports about Cybersecurity, Defence and Technology
Curated by Jose Ramon Coz
Your new post is loading...
Your new post is loading...
Scooped by Jose Ramon Coz
Scoop.it!

Noticias Los Expertos Opinan LOS EXPERTOS OPINAN: El Ciber Reino Unido, una gran apuesta por la Ciberseguridad y la Ciberdefensa

Noticias Los Expertos Opinan LOS EXPERTOS OPINAN: El Ciber Reino Unido, una gran apuesta por la Ciberseguridad y la Ciberdefensa | Cybersecurity and Technology | Scoop.it
ISMS Forum Spain es una Asociación española sin ánimo de lucro, cuyo principal objetivo
es fomentar la seguridad de la información en España. ISMS Forum Spain se constituye como foro especializado en materia de seguridad de la información.
La asociación está respaldada por empresas y organizaciones comprometidas con la Seguridad de la Información. ISMS Forum
Spain es a hoy en día la mayor red activa española de Seguridad de la Información. Entre las iniciativas de ISMS Forum se encuentran el Data Privacy Institute (DPI),
el Cloud Security Alliance (CSA) y el instituto de la Ciberseguridad (SCS), además de las Jornadas Internacionales bianuales,
el foro de la privacidad y los desayunos de trabajo o workshops
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets | Cybersecurity and Technology | Scoop.it
Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and tapping into...
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Top 5 cybersecurity risks for 2015 - CNBC

Top 5 cybersecurity risks for 2015 - CNBC | Cybersecurity and Technology | Scoop.it
From identity theft to corporate hacking attacks, cybersecurity has never been more important for businesses, organizations and governments.
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

UC3M participates in a new simulator that provides training in cybersecurity - Phys.Org

UC3M participates in a new simulator that provides training in cybersecurity - Phys.Org | Cybersecurity and Technology | Scoop.it
Researchers from Universidad Carlos III de Madrid and the Universidad de Málaga have collaborated with the consulting and technology company Indra on the development of a new advanced simulator of training in cybersecurity, a system that teaches...
more...
No comment yet.
Rescooped by Jose Ramon Coz from European Union - Justice and Home Affaires
Scoop.it!

Internet firms push to be left out of EU cybersecurity law

Internet firms push to be left out of EU cybersecurity law | Cybersecurity and Technology | Scoop.it
EU lawmakers want the law to cover only sectors that they consider critical, such as energy, transport and finance. But the Commission - the EU executive - and some countries, such as Germany and France, are pushing to include cloud providers, social networks, search engines and e-commerce platforms because of their widespread use by people and businesses. Internet companies are firmly opposed to such a move, which would incur extra compliance costs.

Via Marc Van den Broeck
more...
Matthieu Lietaert's curator insight, December 11, 2014 5:12 AM

'All animals are equal, but some animals are more equal than others.' - George Orwell  ;)

Ivan Garcia-Hidalgo's curator insight, December 11, 2014 10:00 AM

Internet firms push to be left out of EU #cybersecurity law, Google and Cisco among them.

Scooped by Jose Ramon Coz
Scoop.it!

In North Korea, hackers are a handpicked, pampered elite

In North Korea, hackers are a handpicked, pampered elite | Cybersecurity and Technology | Scoop.it
SEOUL (Reuters) - Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state said as Pyongyang came...
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Australia's cyber security strategy under review - Enterprise Innovation

Enterprise Innovation Australia's cyber security strategy under review Enterprise Innovation The Department of the Prime Minister and Cabinet will lead the Cyber Security Review assisted by a panel of experts, including the CEO of the Business...
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Cybersecurity experts warn of malware designed by government - WWMT-TV

Cybersecurity experts warn of malware designed by government - WWMT-TV | Cybersecurity and Technology | Scoop.it
(NEWSCHANNEL 3) - Cybersecurity experts are concerned over newly discovered malware that appears to be designed by a government.The malware, called
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Domain Blocking: The Problem of a Googol of Domains | certcc

Domain Blocking: The Problem of a Googol of Domains | certcc | Cybersecurity and Technology | Scoop.it
Domain Blocking: The Problem of a Googol of Domains 10/23/2014
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Alaska's Online Voting Leaves Cybersecurity Experts Worried - IEEE Spectrum

Alaska's Online Voting Leaves Cybersecurity Experts Worried - IEEE Spectrum | Cybersecurity and Technology | Scoop.it
Experts warn of online voting's risks even as Alaska's Internet ballot system was deployed in a pivotal election
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Cuando la ciberseguridad es una prioridad política - Elcano Blog

Cuando la ciberseguridad es una prioridad política - Elcano Blog | Cybersecurity and Technology | Scoop.it
El presidente Barack Obama ha vuelto a situar la ciberseguridad y su defensa en primera línea de la agenda política de EEUU.
more...
No comment yet.
Rescooped by Jose Ramon Coz from HIPAA Compliance for Medical Practices
Scoop.it!

How to create a hospital cybersecurity framework

How to create a hospital cybersecurity framework | Cybersecurity and Technology | Scoop.it

As cybertattacks on the healthcare industry increase in intensity, hospitals and healthcare providers must establish a cybercentric framework.

For providers who don't have such a framework in place, Christopher Paidhrin, security administration and integrity manager in the compliance division of Pacific Northwest-based PeaceHealth, says it is important to do two things: Create a spreadsheet that can stimulate ideas and don't forget about business associates and vendors, including the flow of information into and out of the organization is imperative.

A good security risk template to consider is the National Institute of Standards and Technology's cybersecurity framework, he writes at HealthcareInfoSecurity.

Through his experience with cybersecurity, Paidhrin says he learned that being agile and proactive is very important, as is having early detection of threats and rapid response to attacks.

Providers, according to Paidhrin, should also start small: "Do something today that makes a difference tomorrow," he says.

In addition, he says organizations should communicate and pool their information to better help one another prepare for and prevent attacks.

NIST, in November, created draft guidelines to help organizations share information during and after a cyberattack.

"By sharing cyberthreat information, organizations can gain valuable insights about their adversaries," Christopher Johnson, lead author of the guidelines, says in an announcement. "They can learn the types of systems and information being targeted, the techniques used to gain access and indicators of compromise."

In addition,, the Health Information Trust Alliance says it will include privacy controls in version seven of its Common Security Framework.

 


Via Technical Dr. Inc.
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Healthcare Faces Massive Cybersecurity Risks | EMR and HIPAA

Healthcare Faces Massive Cybersecurity Risks | EMR and HIPAA | Cybersecurity and Technology | Scoop.it
The Washington Post has just published a report on cybersecurity arguing that healthcare is one of the most vulnerable industries in the U.S.
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

U.S. Department of Justice Launches Cybersecurity Unit - eSecurity Planet

U.S. Department of Justice Launches Cybersecurity Unit - eSecurity Planet | Cybersecurity and Technology | Scoop.it
The new unit will operate within the department's Computer Crime and Intellectual Property Section.
more...
No comment yet.
Rescooped by Jose Ramon Coz from 21st Century Learning and Teaching
Scoop.it!

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches | Cybersecurity and Technology | Scoop.it
In this lesson, students will learn about the extent of cyberattacks just in the past year and the risks they pose for companies, governments and individuals.

Via Gust MEES
more...
Scooped by Jose Ramon Coz
Scoop.it!

Justice Department to Create Dedicated Cyber Unit

Justice Department to Create Dedicated Cyber Unit | Cybersecurity and Technology | Scoop.it
The Department of Justice is creating a dedicated cybersecurity unit within its Criminal Division.
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

For China, Cybersecurity Is Part of Strategy for Protecting the Communist Party - New York Times (blog)

For China, Cybersecurity Is Part of Strategy for Protecting the Communist Party - New York Times (blog) | Cybersecurity and Technology | Scoop.it
A paper released by the Center for a New American Security in Washington concludes that China’s cybersecurity strategy, like its foreign policy, is driven mainly by the domestic political imperative to “protect the longevity of the Chinese Communist...
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Belgium: Cybersecurity center to co-ordinate national strategy - DataGuidance (press release)

Belgium: Cybersecurity center to co-ordinate national strategy - DataGuidance (press release) | Cybersecurity and Technology | Scoop.it
Via Google Yahoo & Bing News Search Cybersecurity November 27, 2014 at 07:04PM Belgium: Cybersecurity center to co-ordinate national strategy DataGuidance (press release) A Royal Decree (‘the Decree’)...
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

Cybersecurity: Time for the U.S. to Stop Negotiating with China and Start Acting - Daily Signal

Cybersecurity: Time for the U.S. to Stop Negotiating with China and Start Acting - Daily Signal | Cybersecurity and Technology | Scoop.it
It comes as no surprise that the U.S.–China cybersecurity talks at the Asia–Pacific Economic Cooperation (APEC) largely failed.
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

ARABIA SAUDÍ, EL PAIS DEL PETROLEO…Y LA CIBERSEGURIDAD!

ARABIA SAUDÍ, EL PAIS DEL PETROLEO…Y LA CIBERSEGURIDAD! | Cybersecurity and Technology | Scoop.it
Dr. José Ramón Coz Fernández Miembro fundador y Analista Internacional de THIBER.  Es ampliamente conocido que Arabia Saudí es, sin duda, el país del petróleo. Arabia Saudí dispone de un quinta par...
more...
No comment yet.
Scooped by Jose Ramon Coz
Scoop.it!

A New Approach to Prioritizing Malware Analysis » SEI Blog

A New Approach to Prioritizing Malware Analysis » SEI Blog | Cybersecurity and Technology | Scoop.it
Immediate and accessible insights into the broad spectrum of work we do at the SEI
more...
No comment yet.