Posts Tagged: cyber

Administration issues far-reaching plan for building cyber workforce

BY ALIYA STERNSTEIN 08/12/2011 The Obama administration on Friday released the first-ever roadmap for building a U.S. cybersecurity workforce and testing the government’s success at raising public awareness of computer threats. Currently, there is no definition of what it means to be a cybersecurity professional. The draft strategic plan sets forth a way to measureRead… Read more »

Preparing for the Fight

Originally posted on By Prem Iyer, Director of Information Security at Iron Bow Technologies Despite a reported reduction in the number of cyber attacks, major brands and government agencies across the globe have been the targets of increasingly sophisticated cyber attacks. A notorious hacker group, LulzSec, has recently infiltrated government Web sites belonging toRead… Read more »

Think Globally, Act Locally: Implications of the International Cyberspace Strategy for Fed Leaders

The IBM Center for the Business of Government recently posted this article from Dan Chenok on its blog: On Monday, at an event with the Secretaries of State, Commerce, Homeland Security, the Attorney General, and the Deputy Secretary of Defense, the Obama Administration released its international strategy for cyberspace. The strategy, described in a postRead… Read more »

What the White House Really Wants In Cyber

With 50 bills in Congress having to do with cybersecurity, and none of them showing any imminent signs of movement, the White House at last weighed in with its own legislative proposal. In an online statement, the president’s staff said it was outlining its cyber legislative goals in response to a request from Senate MajorityRead… Read more »

International Cyber Strategy is Florid, If Short On Specifics

The administration’s International Strategy for Cyberspace released on Monday is more a dream or vision than a set of hard-nosed proposals. Yet it does have strong expressions of value, calling for “norms of behavior” expected of other nations. To get to this future vision, the administration proposes a 3D approach — diplomacy, defense and development.Read… Read more »

Mobile Cybersecurity…Things Really Have Gotten Wild!

Last week I had the wonderful opportunity to attend the AFFIRM Luncheon for an awesome talk on the state of cybercrime worldwide. Donald Codling, Unit Chief and DHS Liaison, Cyber Division from the FBI, took us through a very informative presentation on the topic of cybercrime on a mobile scale. I never knew there wereRead… Read more »

Air Force names 2011 Cyberspace Operations and Support Hall of Fame inductees

Congrats to all the inductees, but especially for my colleague General Harry Raduege! He chairs Deloitte’s Center for Cyber Innovation ( and it’s a pleasure and honor to work with him. Original article link: 3/14/2011 by Tech. Sgt. Jess Harvey Secretary of the Air Force Public Affairs 3/14/2011 – WASHINGTON (AFNS) — Five AirmenRead… Read more »

Public/Private Relationship for Cybersecurity

Interesting article at Defense Systems “We’re not embracing the issue in its totality,” said Larry Clinton, president and CEO of the Internet Security Alliance, at the forum. “Right now, the private sector is in charge of securing critical infrastructure, and the government’s job is compliance. They have fundamentally misunderstood the relationship that needs to developRead… Read more »

The Conversation on Radical Information Transparency and the Government continues

” . . . the national security apparatus is groaning under the weight of record amounts of classified information, not to mention the attendant material costs of protecting its secrets for longer and longer periods of time. To be sure, this is partly due to the fact that it’s collecting more intelligence than ever before,Read… Read more »

Privacy News Highlights – August 15th

Some top privacy news Biometrics US – U.S. Scans Afghan Inmates for Biometric Database Wired reports on the U.S. military’s new detention facility in Parwan, Afghanistan, as “an emerging datafarm” where all detainees brought to the facility are given medical exams and have their irises scanned and fingerprints taken to be stored in a militaryRead… Read more »