"The U.S. and Russia are committed to tackling common cybersecurity threats while at the same time reducing the chances a misunderstood incident could negatively affect our relationship," says White House Cybersecurity Coordinator Howard Schmidt.
Eddie Schwartz didn't shy away from the offer to become RSA's first chief security officer after the security firm experienced a sophisticated advanced-persistent-threat breach. Instead, Schwartz embraced the hack as the reason to take the job. (See RSA to Get Its First Chief Security Officer.)
Fraud today is global. The same problems happening in the U.S. are simultaneously occurring in other parts of the world. For interested job seekers, there's never been a better time to enter the fraud examiner profession.
"We infiltrated a server on their network that basically had no security measures in place," according to the posting of the hacking group. "We were able to run our own application, which turned out to be a shell and began plundering some booty."
Many implantable medical devices have wireless connections that enable physicians to monitor patients. But with that wireless connectivity comes the risk of a hacker attack with potentially life-threatening results.
Among the 12 computer-related job classifications tracked by the Department of Labor's Bureau of Labor Statistics, information security analysts was one of only two categories to report no unemployment during the second quarter of 2011.
William Lynn, the former national security adviser to the late Sen. Edward Kennedy, helped foster DoD's strategy to protect the military's and nation's digital assets, including the standup of the U.S. Cyber Command.
Minnesota has seen an increase in malicious traffic since the state government shut down a week ago, but state CISO Chris Buse says sophisticated intrusion-detection systems and an alert skeleton staff have prevented any harm from being done, at least to the part of state government IT controlled by the Office of...