Cyber defense: Competition at Johns Hopkins APL Baltimore Sun Eight teams of students are fending off a massive cyber attack in the midst of a storm more devastating than Maryland's blizzard of 1993, prompting the governor and president to declare...
ANKARA - Turkish Foreign Minister Ahmet Davutoğlu said on Friday that everybody and everything will be investigated to find the "pawns and the mastermind" responsible for the eavesdropping of a high-level security meeting.
The Latvian army hired the country's first 13 cyber guards in February. As part of the Cyber Defence Unit, they will also help Latvia's military and government's IT security response in the event of a conflict.
concertina226 writes "If you think the crisis in the Ukraine is limited just to being just on the ground, think again. A cyberwar is flaring up between Ukraine and Russia and it looks like just the beginning.
The meeting will offer a venue for discussion among ethicists, policy makers, international lawyers and military experts to consider the existing regulatory gap concerning cyber warfare and the ethical problems underpinning it.
Vicente Pastor's insight:
The workshop is co-directed by Lt Ludovica Glorioso (NATO CCD COE) and Dr Mariarosaria Taddeo (University of Warwick).
Extended abstracts (2000 words): 9 September 2014
Notification of acceptance: 30 September 2014
Full paper: 31 October 2014
Time: 11-12 November 2014
Place: Magdalen College, University of Oxford, UK
Participation: no participation fee, registration opens in September 2014
US Government studied Mega Cavern as cyber attack safety net WAVE Experts at the Speed School say a large scale cyber attack on the nation's banks and stock markets could short circuit the U.S. financial system and bring the economy to a grinding halt.
Signal center officially becomes Cyber Center The Augusta Chronicle Fort Gordon officials ushered in the future of cyber warfare, national security and military communications at a ceremony Friday officially renaming the base's U.S.
Russia’s takeover of the Crimean peninsula has been accompanied by a elements of an information-control campaign: telecom cables connecting that region to the rest of Ukraine have been severed, and the Russian government has moved to block Internet pages devoted to the Ukrainian protest movement.
Today the Obama Administration is announcing the launch of the Cybersecurity Framework, which is the result of a year-long private-sector led effort to develop a voluntary how-to guide for organizations in the critical infrastructure community to enhance their cybersecurity. The Framework is a key deliverable from the Executive Order on “Improving Critical Infrastructure Cybersecurity” that President Obama announced in the 2013 State of the Union.
Through the development of this Framework, industry and government are strengthening the security and resiliency of critical infrastructure in a model of public-private cooperation. Over the past year, individuals and organizations throughout the country and across the globe have provided their thoughts on the kinds of standards, best practices, and guidelines that would meaningfully improve critical infrastructure cybersecurity. The Department of Commerce's National Institute of Standards and Technology (NIST) consolidated that input into the voluntary Cybersecurity Framework that we are releasing today.
The Framework gathers existing global standards and practices to help organizations understand, communicate, and manage their cyber risks. For organizations that don’t know where to start, the Framework provides a road map. For organizations with more advanced cybersecurity, the Framework offers a way to better communicate with their CEOs and with suppliers about management of cyber risks. Organizations outside the United States may also wish use the Framework to support their own cybersecurity efforts.
Each of the Framework components (the Framework Core, Profiles, and Tiers) reinforces the connection between business drivers and cybersecurity activities. The Framework also offers guidance regarding privacy and civil liberties considerations that may result from cybersecurity activities.