List/Grid Cyber Subscribe RSS feed of category Cyber

Johns Hopkins APL to Host Mid-Atlantic Collegiate Cyber Defense Competition; Lewis Lightner Comments

Johns Hopkins APL to Host Mid-Atlantic Collegiate Cyber Defense Competition; Lewis Lightner Comments

Eight collegiate cyber defense teams will participate in the 2014 National CyberWatch Center Mid-Atlantic Regional Collegiate Cyber Defense Competition next week at the Johns Hopkins University Applied Physics Laboratory in Maryland. JHUAPL… Read more »

email
FireEye White Paper Aims to Help Enterprises Manage Security Breaches; Jason Steer Comments

FireEye White Paper Aims to Help Enterprises Manage Security Breaches; Jason Steer Comments

FireEye has released a white paper that suggests cybersecurity measures for helping enterprise IT personnel identify and address zero-day threats. The report was a collaboration between executives from FireEye, Mandiant, LogRhythm… Read more »

Tom Moore: McAfee-Schneider Electric Team to Help Energy Clients ‘Whitelist’ Applications

Tom Moore: McAfee-Schneider Electric Team to Help Energy Clients ‘Whitelist’ Applications

McAfee and Schneider Electric have formed a partnership that will offer whitelisting, cybersecurity and change control services to the utility and critical infrastructure industry for customers’ energy management tools. The companies said Tuesday that… Read more »

FireEye Paper for NATO Seeks to Connect Network Security, National Securiy

FireEye Paper for NATO Seeks to Connect Network Security, National Securiy

A paper by FireEye‘s senior global threat analyst has been published by NATO’s Cooperative Cyber Defence Centre of Excellence as the first volume of “The Tallinn Papers,” a cybersecurity research series. Kenneth Geers sought… Read more »

Ken Silva: ManTech Unit HBGary Updates Cyber Analysis, Verification Tool

Ken Silva: ManTech Unit HBGary Updates Cyber Analysis, Verification Tool

HBGary, a ManTech International company, has updated a cyber defense product that works to help enterprises identify and validate computer security incidents caused by custom-coded malware. Active Defense uses a… Read more »

Martin Sutherland of BAE: Cyber Espionage Malware ‘Organized, Well-Funded’

Martin Sutherland of BAE: Cyber Espionage Malware ‘Organized, Well-Funded’

BAE Systems has published a threat analysis report that describes how the cyber espionage malware known as Snake attacks computer systems and how the virus works to avoid conventional security… Read more »

Northrop’s Ron Foudray: New Cyber Strategies Needed in Federal IT

Northrop’s Ron Foudray: New Cyber Strategies Needed in Federal IT

Northrop Grumman’s Ron Foudray has suggested that federal IT experts re-examine their cybersecurity strategies and seek new methods beyond encryption to protect information, GSN reported Wednesday. Ashley Bennett writes that… Read more »

McAfee, NEC Form Industrial Computer Security Team; Tom Moore Comments

McAfee, NEC Form Industrial Computer Security Team; Tom Moore Comments

NEC, an information technology products provider, has picked a McAfee embedded security platform to safeguard NEC’s industrial automation system products against cyber threats. McAfee’s Embedded Control technology works by running… Read more »

David DeWalt: FireEye Opens European R&D Center to Develop Cyber Threat Defense Tech

David DeWalt: FireEye Opens European R&D Center to Develop Cyber Threat Defense Tech

FireEye has opened a Dresden, Germany-based research and development center, where the company will work with European educational institutions on security research, FireEye said Tuesday. David DeWalt, FireEye chairman and CEO, said the… Read more »

FireEye’s Kenneth Geers: IT Officers Seek Clues as Cyber Attacks Proliferate

FireEye’s Kenneth Geers: IT Officers Seek Clues as Cyber Attacks Proliferate

Evolving tactics and the speed of how the number of cyber attacks has grown are leaving infrastructure vulnerable as technology officers increasingly scramble for new ways to predict a strike,… Read more »

Symantec to Analyze Security Data with Splunk Software Platform; Julie Talbot-Hubbard Comments

Symantec to Analyze Security Data with Splunk Software Platform; Julie Talbot-Hubbard Comments

Symantec Corp. has partnered with Splunk Inc. to build up security intelligence initiatives with a Splunk-developed software platform. Symantec will work to examine events and detect threats by using the… Read more »

Terremark’s Rafeeq Rehman on Potential Security Lessons from Data Breaches

Terremark’s Rafeeq Rehman on Potential Security Lessons from Data Breaches

Rafeeq Rehman, senior security solutions architect at Verizon Terremark, has urged enterprises to draw lessons from large data breaches that have occurred to retailers in the U.S. and around the world…. Read more »

Jean-Paul Bergeaux: SwishData Cyber Practice Aims to Help Counter ‘Rising Tide’ of Threats

Jean-Paul Bergeaux: SwishData Cyber Practice Aims to Help Counter ‘Rising Tide’ of Threats

SwishData has formed a new cybersecurity practice that will work to help agencies combat cyber threats. The company intends to help agencies identify anomalies and attacks, as well as to gain… Read more »

CSC Extends Govt Market Cyber Service to Commercial Markets; Samuel Visner Comments

CSC Extends Govt Market Cyber Service to Commercial Markets; Samuel Visner Comments

Computer Sciences Corp. will offer a commercially-available incident response service to companies that are seeking to acquire tools for combating persistent and evolving threats. The incident and breach management product… Read more »

Martin Sutherland: BAE Eyes Demand for Tools Against Digital Criminality

Martin Sutherland: BAE Eyes Demand for Tools Against Digital Criminality

Growing awareness from U.K. enterprises on digital criminality could increase demand for methods to repel cyber attacks, according to Martin Sutherland, managing director for BAE Systems Applied Intelligence. Ninety percent… Read more »

© 4968 ExecutiveBiz. All rights reserved.