Tag Archives: National

My latest Gartner Research:Cool Vendors in Spain, 2016

CIOs worldwide should realize that Spain has a substantial number of IT providers with cutting-edge innovative offerings, with strong involvement in digital business and transcending to international markets.

Gartner customers may access this research by clicking here.




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Small-time security threats bigger concern

http://www.autonews.com/article/20150309/FINANCE_AND_INSURANCE/303099941/small-time-security-threats-bigger-concern By David Barkholz Automotive News March 9, 2015 The biggest threats to a dealership’s data aren’t Russian hackers breaking through electronic firewalls or robots trying a thousand passwords on security codes until they finally crack into the system. It’s more likely the mundane stuff that will cause a breach that enables personal consumer data to slip out of the store, said Brad Miller, director of legal and regulatory affairs for the National Automobile Dealers Association. Watch out, he said, for laptops that may contain sensitive files being stolen out of cars. A thumb drive that contains code capable of capturing passwords or data can be plugged into the laptop. Also, software vendors long ago dropped by a dealership may retain active pass codes that enable data to be taken from the dealership, unbeknownst to store employees, Miller said. Or pirates may send dealership employees a “phishing” email hoping to fool one into giving out information or a password that opens the system to the thieves. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] This Article Was Written With the Help of a ‘Cyber’ Machine

http://www.wsj.com/articles/is-the-prefix-cyber-overused-1425427767 By DANNY YADRON and JENNIFER VALENTINO-DEVRIES The Wall Street Journal March 4, 2015 These days, CyberPatriots go to CyberCamps. Washington wonks ponder a Cyber Red Cross. Last week, the Director of National Intelligence told Congress a “cyber Armageddon” is unlikely. This week, CBS Corp. will premiere the latest iteration of its long-running cops and crime franchise, “CSI: Cyber,” whose protagonist describes herself as cybercop and is based, the network says, on a real-life cyberpsychologist. For some, it is cyber-overload. Stop using the word,” Alex Stamos, the chief information security officer at Yahoo Inc. told a “Cybersecurity for a New America” conference in Washington last week. Earlier, Mr. Stamos quipped on Twitter that he had won “CyberBingo” at his table after a conference speaker warned of a “Cyber Pearl Harbor,” a term popularized by former Defense Secretary Leon Panetta in 2012. Mr. Stamos isn’t brushing off computer intrusions in his quest to hack away at “cyber” usage. As the guy in charge of keeping prying eyes out of one of the world’s most popular websites, you could say he is obsessed with them. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Tesla worried customers will get hurt hacking the Model S

http://www.rawstory.com/rs/2015/03/tesla-worried-customers-will-get-hurt-hacking-the-model-s/ By Thomas Halleck Posted with permission from International Business Times March 4, 2015 Tesla Motors Inc. warned investors that its stock could be negatively affected by customers hacking its Model S and other cars and injuring themselves in the process. The company also said that safety issues with the lithium ion batteries used to power its electric vehicles also pose a risk that could negatively affect business. Tesla released a number of potential risks to its business last week, including the high cost of producing the Model S sedan and unforeseen production delays, which could cause the company to miss projected sales and revenue figures. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] FAA computers vulnerable to hackers, GAO report says

http://www.washingtonpost.com/local/trafficandcommuting/faa-computers-vulnerable-to-hackers-gao-report-says/2015/03/02/388219ac-c119-11e4-9271-610273846239_story.html By Ashley Halsey III The Washington Post March 2, 2015 The Federal Aviation Administration has fallen short in its efforts to protect the national air traffic control system from terrorists or others who might try to hack into the computers used to direct planes in flight, according to a government report released Monday. The Government Accountability Office report credited the FAA with taking steps to deter hackers but concluded that “significant security control weaknesses remain, threatening the agency’s ability to ensure the safe and uninterrupted operation of the national airspace.” The FAA said it intends to implement the 14 changes recommended in the GAO report. In a written response to the GAO last month, Keith Washington, acting assistant secretary for administration at the Department of Transportation, said the FAA already had achieved six “major milestones” toward improving cybersecurity and agreed with the GAO recommendations for improvements. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Australian politicians are reportedly using top-secret messaging app Wickr

http://mashable.com/2015/03/01/australia-politicians-wickr/ By Jenni Ryall mashable.com March 1, 2015 Australian politicians are reportedly using the secret messenging app Wickr to communicate with each other on the sly. According to The Australian, Communications Minister Malcolm Turnbull and Minister for Social Services Scott ­Morrison have been using the service to communicate about their dissatisfaction with Prime Minister Tony Abbott and the ongoing leadership crisis. It follows months of speculation regarding instability within the Liberal-National Coalition Government, which culminated in a vote on whether to declare Abbott’s position vacant. That motion was defeated, but it has not quelled the rumours that members of his government are secretly pushing for a change of leadership. Wickr has a secure file-shredding feature that destroys all communication on your device and claims it has “military-grade encryption.” On the app’s website, the company claims that no conversations can be tracked or monitored using the app, which may mean that The Australian received a tip regarding the top-secret communications between the two politicians. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] NIST outlines guidance for security of copiers, scanners

http://gcn.com/articles/2015/02/25/nist-replication-device-security.aspx By GCN Staff Feb 25, 2015 The National Institute of Standards and Technology announced its internal report 8023: Risk Management for Replication Devices is now available. The guidance covers protecting the information processed, stored or transmitted on replication devices (RDs), which are devices that copy, print or scan documents, images or objects. Because today’s RDs have the characteristics of computing devices (storage, operating systems, CPUs and networking) they are vulnerable to a number of exploits, NIST said. Among the threats to RDs are: […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] NSA staffers rake in Silicon Valley cash

http://thehill.com/policy/cybersecurity/233740-nsa-staffers-rake-in-silicon-valley-cash By Cory Bennett The Hill 02/24/15 Former employees of the National Security Agency are becoming a hot commodity in Silicon Valley amid the tech industry’s battle against government surveillance. Investors looking to ride the boom in cybersecurity are dangling big paydays in front of former NSA staffers, seeking to secure access to the insider knowledge they gained while working for the world’s most elite surveillance agency. With companies desperate to protect their networks against hackers, many tech executives say the best way to develop security products is to enlist the talents of people who have years of experience cracking through them. “The stories he could tell,” venture capitalist Ray Rothrock recalled about his meetings with a former NSA employee who founded the start-up Area 1 Security. “They come with a perspective that nobody in Silicon Valley has.” […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail