As reported Monday by the Times of Israel, Prime Minister Benjamin Netanyahu of Israel opened up his country’s first cybersecurity conference, Israel CyberTech 2014, on January 27th, saying “I think Israel is unquestionably a leading power, disproportionate to its size, with great talents and great resources. We have decided to put these resources together in a coherent way and we have structured a National Cyber Bureau.”
“The threat level is higher than it has ever been for any other sporting event since 9/11,” explains Dr. Gordon Woo, a catastrophist at RMS. RMS is a company based in Newark, CA that provides catastrophe risk models to insurance companies and financial institutions.
When it comes to digital privacy, U.S. consumers are more concerned with how businesses collect and use their data than they are with government surveillance, according to a study from the data privacy management company TRUSTe, of San Francisco. The conclusion could surprise some, given the relatively large number of media reports in recent months about government surveillance of citizen’s data.
Back when the Internet was young, a type of hacker called script kiddies emerged. These were people who were passionate about hacking but lacked the expertise, so most of their successes came from running programs and exploits written by others. As more and more scanner/injector kits, malware kits, and other tools were made available, script kiddies were a small but growing part of the threat landscape.
Salient Federal Solutions, of Fairfax, VA, a leading provider of information technology, training, engineering, and intelligence analytical services to agencies in the intelligence, defense, homeland security, cyber security, and federal civilian markets, has appointed Carlos Fernandes as director of the company’s Cyber Security Center of Excellence (CSCoE).
“It has been proven routinely in one security test after another that any hacker with a bit of skill and time can take control of equipment on safety-critical networks,” said Andrew Ginter, vice president of industrial security at Waterfall Security. Waterfall, of Calgary, CA specializes in providing data diodes and unidirectional security gateways to critical infrastructure facilities such as nuclear power plants, water treatment facilities, and transportation systems.
People interested in attending the 2014 Winter Olympic Games in Sochi are advised to take extra precautions to protect themselves from cyber attacks during the events, according to Lysa Myers, a cybersecurity expert. “The most important thing is that the people behind the Olympics are already well aware of the risks, but the attendees are not necessarily aware of all of the risks that they are being exposed to,” she explains.
SJ Software Development Group has engineered a security solution for instant messaging (IM) programs that’s both easy to deploy and very hard for hackers to crack, according to the company. SJ IM is available for Windows, Mac OS X and iOS. The solution can benefit government agencies, corporations, and individuals.
Palo Alto, CA-based Skyfence Networks has announced the Skyfence Cloud Gateway, which protects cloud applications from account hijacking, insider attacks, and data theft. Skyfence integrates threat prevention, activity monitoring, and compliance management to secure and prevent data theft on any cloud application, the company says.
Financial institution credit cards are more secure than retailer credit cards, according to a new study by Javelin Strategy & Research, of Pleasanton, CA. The top scoring institutions when it comes to fraud prevention, detection, and resolution are Bank of America, United Services Automobile Association (USAA), Wells Fargo, SunTrust, and Associated Bank. Javalin’s ninth annual credit card issuer’s study scored 24 of the nation’s top credit card issuers.
|Event Details||Dates of Event|
|Critical Infrastructure Protection and Resilience Europe||Feb 12 - 13|