Public-Private Industry Collaboration
Howard Schmidt, who began as White House cyber security coordinator in January 2010, announced Thursday that he is retiring and returning to private life. He will be replaced by a White House intelligence chief.
The Georgia Tech Research Institute (GTRI) is currently heading a new five-year, $10 million U.S. Department of Homeland Security project to investigate open cybersecurity methods and how they can benefit government. The program, called Homeland Open Security Technology (HOST), is aimed at identifying open-source approaches that can support federal security objectives while saving agencies money. As part of the program, GTRI researchers are reaching out to members of government, industry and academia to learn how such solutions have been successfully implemented and where challenges remain. They plan to launch a public information portal this summer.
Larry Clinton, CEO of the Internet Security Alliance, says he tries to bring industry and government together to figure out how to secure all the popular digital devices in use.
Symantec CEO Enrique Salem has been named to President Obama's Management Advisory Board, a panel created last year to provide advice on how to implement best practices related to management and operation issues within the government, the White House announced Thursday. Nine other business executives were appointed to the board, including Shantanu Narayen, CEO of Adobe, and Greg Brown, CEO of Motorola Solutions. The group was scheduled to hold its first meeting on Friday. - AM
Just as cybercriminals share information, the private, private and international communities must ally to combat today's threats.
Building trust between the public and private sectors can be a challenge.
A survey gauging public awareness over the need for internet safety and security confirms the need for a new national messaging campaign, according to two nonprofits.
A number of experts testified before U.S. House members Thursday that research and development is needed to improve ways to determine the identity and location of cyberattackers. Such technologies could could limit the impact of a major attack, witnesses said at a meeting of the U.S. House Subcommittee on Technology. During the hearing, members and witnesses said that increasing coordination between government and industry to develop new attack attribution technologies would help prevent redundant efforts and take advantage of all available resources. — AM
We need to develop a collective consciousness for coping with the growing menace of cyber attacks, says Stanton Sloane.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context