Cyber Briefs
contact us at info@cyberbriefs.org
World's Only Cyber Security News Aggregate
Index of Cyber Security Perceived Risk
Cyber Security Investment Index
 

United States News

WidePoint and SPYRUS Enable Higher Assurance Security for Microsoft Windows To Go(R)

Directors' Concerns about Regulatory Risk, Including Dodd-Frank and PPACA, Declining According to 2014 EisnerAmper Survey

Report Urges Cybersecurity Legislation

SEC Eyes Cyber-Security Planning


Are cybersecurity startups a safe place to put money?

Towson University students are getting a direct path to NSA jobs


SIGNIFICANT DEFICIENCIES FOUND IN TREASURY’S COMPUTER SECURITY

Cyber-crime a real threat to small business in Britain

Cybersecurity startups to bank $788 million


Using Analytics to Prioritize Spending on Cybersecurity

Retiring One-Time Passwords for Good

Deadline extended for Top Workplaces

Cybersecurity stakes are high

Can New York’s BitLicense Prevent Another Mt. Gox Catastrophe?

University of Cincinnati joins with National Security Agency to fight cyber crime

Big Data & Cyber Security

Cyber Security In Health Care Needs Senior Leadership

As the Worm Turns: Why Cyber Security Matters


The Senate should reject a flawed cybersecurity bill

Tripwire announces comprehensive support for PCI DSS 3.0 in Tripwire Enterprise


Websites

U.S. Department of Homeland Security

U.S. Department of Homeland Security

The White House

The White House

Department of Defense

Department of Defense

United States Computer Emergency Readiness Team

United States Computer Emergency Readiness Team

Center for Internet Security

Center for Internet Security

National Cyber Security Alliance

National Cyber Security Alliance

Cybersecurity - Delaware.gov

Cybersecurity - Delaware.gov

Cybersecurity - Colorado.gov

Cybersecurity - Colorado.gov

Cybersecurity - Michigan.gov

Cybersecurity - Michigan.gov

The MITRE Corporation - Cybersecurity

The MITRE Corporation - Cybersecurity

Cybersecurity - California.gov

Cybersecurity - California.gov

Council On Cybersecurity

Council On Cybersecurity

Cyber Security Awareness - NASCIO

Cyber Security Awareness - NASCIO

Inside Cybersecurity

Inside Cybersecurity

Information Systems Security Association

Information Systems Security Association

Cybersecurity for Small Business

Cybersecurity for Small Business

FBI - Cyber Crime

FBI - Cyber Crime

Cybersecurity Framework

Cybersecurity Framework

Cybersecurity - Oklahoma.gov

Cybersecurity - Oklahoma.gov

TechNewsWorld

TechNewsWorld

Cyber Security Resources - NCUA

Cyber Security Resources - NCUA

Cybersecurity - Vermont.gov

Cybersecurity - Vermont.gov

Cyber Security Summit

Cyber Security Summit

CyberWatch

CyberWatch

The Wire - Cybersecurity

The Wire - Cybersecurity

Cybersecurity - Alabama.gov

Cybersecurity - Alabama.gov

Cybersecurity - Missouri.gov

Cybersecurity - Missouri.gov

Cybersecurity Law Institute

Cybersecurity Law Institute

Cybersecurity - Pennsylvania.gov

Cybersecurity - Pennsylvania.gov

Federal Cybersecurity R&D

Federal Cybersecurity R&D

Cybersecurity - Maryland.gov

Cybersecurity - Maryland.gov


Books

Cybersecurity and Cyberwar: What Everyone Needs to Know

Cybersecurity and Cyberwar: What Everyone Needs to Know

Cybersecurity Leadership: Powering the Modern Organization

Cybersecurity Leadership: Powering the Modern Organization

Hacking: The Art of Exploitation, 2nd Edition

Hacking: The Art of Exploitation, 2nd Edition

The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy

The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy

Rtfm: Red Team Field Manual

Rtfm: Red Team Field Manual

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Cyber War: The Next Threat to National Security and What to Do About It

Cyber War: The Next Threat to National Security and What to Do About It

Protecting Our Future: Educating a Cybersecurity Workforce

Protecting Our Future: Educating a Cybersecurity Workforce

Cyberpower and National Security

Cyberpower and National Security

Basic Security Testing with Kali Linux

Basic Security Testing with Kali Linux

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Inside Cyber Warfare: Mapping the Cyber Underworld

Inside Cyber Warfare: Mapping the Cyber Underworld

The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach Into Cybersecurity, Medicine and Small Business

The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach Into Cybersecurity, Medicine and Small Business

Network Security Bible

Network Security Bible

Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex

Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Computer Security Fundamentals

Computer Security Fundamentals

Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security

Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security

Permissionless Innovation: The Continuing Case for Comprehensive Technological Freedom

Permissionless Innovation: The Continuing Case for Comprehensive Technological Freedom

Using Social Media for Global Security

Using Social Media for Global Security



World News


Treasury Secretary Warns of Financial Cyber Threats

Scoop: New life for NCCIP - Seleznev arrest latest – Does cyber undermine global stability?

Proficio Launches Next-Generation Managed Security Services in Asia and Opens Singapore SOC and Regional HQ

Black Hat cancels talk on how to crack Tor

New Speakers Added for Rock Stars of Cybersecurity


Information Age presents the top 10 disruptive technologies facing the enterprise - and the vital security implications around them

Why Indian cyber security infrastructure is vulnerable?

Cyberattacks and espionage – Risks and Prevention

Cyber security confidence undermined by contradicting investments

Learning how to defend against cyber attack

A third of Australian IT security professionals want a complete system overhaul: Websense

Ultimate Big-Data Secret Found Under Mountain

Japanese firms use leading-edge technology for safety and comfort


Two-factor authentication the cheap and easy solution for SMBs: ESET

Cyber security expert to recognize Senator Rockefeller for cyber security leadership

Eight Ways to Improve Your Cyber-Security Spending

Israeli hi-tech firm to launch Energy Cyber Security Center

Israeli Military and Hamas trade Hacking Attacks


As MPs rush through a bill, expert points out the legal limitations. Picture: PA As MPs rush through a bill, expert points out the legal limitations.

Anti-Israel hackers seeking social status, jobs


Journals and Magazines

International Journal of Cyber-Security and Digital Forensics (IJCSDF)

International Journal of Cyber-Security and Digital Forensics (IJCSDF)

National Cybersecurity Institute Journal,

National Cybersecurity Institute Journal,

Journal of Information Assurance & Cybersecurity

Journal of Information Assurance & Cybersecurity

Journal of National Security Law & Policy

Journal of National Security Law & Policy

Cyber Security and Information Systems Information Analysis Center

Cyber Security and Information Systems Information Analysis Center

Journal of Conflict & Security Law

Journal of Conflict & Security Law

Journal of Sensitive Cyber Research and Engineering (JSCoRE)

Journal of Sensitive Cyber Research and Engineering (JSCoRE)

Harvard Law School National Security Journal

Harvard Law School National Security Journal

Journal of Cyber Security and Mobility

Journal of Cyber Security and Mobility

IT Security Journal

IT Security Journal

Computers & Security

Computers & Security

Security Magazine

Security Magazine

Cyber Defense Magazine

Cyber Defense Magazine

US Cyber Security Magazine

US Cyber Security Magazine

SC Magazine

SC Magazine

Security Magazine

Security Magazine

Government Security News

Government Security News

Infosecurity Magazine

Infosecurity Magazine

Fed Tech Magazine

Fed Tech Magazine

Digital Forensics Magazine

Digital Forensics Magazine

CSO

CSO

Government Security Magazine

Government Security Magazine

(IN) Secure Magazine

(IN) Secure Magazine

Security News Portal

Security News Portal

PC Magazine

PC Magazine

PC World

PC World

Infowar

Infowar

Computer Security Basics

Computer Security Basics

Computerworld

Computerworld

Security Managment

Security Managment

The Hacker News Magazine

The Hacker News Magazine


Blogs

CIO

CIO

TechRepublic – Security

TechRepublic – Security

US-CERT

US-CERT

Wired Threat Level

Wired Threat Level

Zero Day from ZDNet

Zero Day from ZDNet

CERIAS Security Blog

CERIAS Security Blog

CSO Online

CSO Online

Dark Reading

Dark Reading

Google Online Security Blog

Google Online Security Blog

Red Tape Chronicles

Red Tape Chronicles

InformationWeek Security

InformationWeek Security

Internet Storm Center

Internet Storm Center

Schneier On Security

Schneier On Security

Securelist Cyber Security Blog

Securelist Cyber Security Blog

Symantec Weblog

Symantec Weblog

The Guardian’s Information Security Hub

The Guardian’s Information Security Hub

Zone Alarm Cyber Security Blog

Zone Alarm Cyber Security Blog

BH Consulting’s Security Watch Blog

BH Consulting’s Security Watch Blog

Contagio Malware Dump

Contagio Malware Dump

Cyber Crime & Doing Time

Cyber Crime & Doing Time

David Lacey’s IT Security Blog

David Lacey’s IT Security Blog

Dell Secure Works

Dell Secure Works

F-Secure Safe & Savvy Blog

F-Secure Safe & Savvy Blog

Fox IT Security Blog

Fox IT Security Blog

Fortinet Blog

Fortinet Blog

Fortinet Blog

Fortinet Blog

Help Net Security

Help Net Security

Infosecurity Magazine

Infosecurity Magazine

Krebs On Security

Krebs On Security

Malwarebytes

Malwarebytes

McAfee Security Blog

McAfee Security Blog

Microsoft Malware Protection Center

Microsoft Malware Protection Center

Naked Security

Naked Security

Network Computing

Network Computing

SANA Institute AppSec Blog

SANA Institute AppSec Blog

SC Magazine

SC Magazine

Search Security

Search Security

Securing The Human

Securing The Human

Security Watch

Security Watch

Stop Badware Blog

Stop Badware Blog

Sucuri Blog

Sucuri Blog

Tao Security

Tao Security

Techworld Security

Techworld Security

The Honeynet Project

The Honeynet Project

Threatpost

Threatpost

Threat Track Security

Threat Track Security

Veracode Blog

Veracode Blog

Unmasked Parasites blog

Unmasked Parasites blog

We Live Security

We Live Security

Xylibox Security Blog

Xylibox Security Blog

Xylibox Security Blog

Xylibox Security Blog

BankInfoSecurity

BankInfoSecurity

Cyveillance Blog

Cyveillance Blog

Forbe's Firewall

Forbe's Firewall

Graham Cluley's Security Blog

Graham Cluley's Security Blog

HotforSecurity

HotforSecurity

Imperva Blog

Imperva Blog

IT Knowledge Exchange - Security Bytes

IT Knowledge Exchange - Security Bytes

ItProPortal.com

ItProPortal.com

Lenny Zeltser On Information Security

Lenny Zeltser On Information Security

Network Security Blog with Martin McKeay

Network Security Blog with Martin McKeay

PandaLabs Cyber Security Blog

PandaLabs Cyber Security Blog

PaulDotCom

PaulDotCom

Privacy & Information Security Law Blog

Privacy & Information Security Law Blog

Rational Survivability

Rational Survivability

Risky Business

Risky Business

Root Labs RDIST

Root Labs RDIST

Seculert Blog

Seculert Blog

Security Street by Rapid7

Security Street by Rapid7

Securosis Blog

Securosis Blog

SilverSky Altitude Blog

SilverSky Altitude Blog

SpiberLabs Security Blog

SpiberLabs Security Blog

Social-Engineering.org

Social-Engineering.org

The Security Skeptic

The Security Skeptic

Thought Crime Cyber Security Blog

Thought Crime Cyber Security Blog

Troy Hunt's Blog

Troy Hunt's Blog

1 Raindrop

1 Raindrop

Andrew Hay's Cyber Security Blog

Andrew Hay's Cyber Security Blog

Carnal Ownage

Carnal Ownage

Command Line Kung Fu

Command Line Kung Fu

Dancho Danchev's Blog

Dancho Danchev's Blog

Darknet

Darknet

Errata Security

Errata Security

Exotic Liability

Exotic Liability

Hack Surfer

Hack Surfer

InfoSec Institute Resources

InfoSec Institute Resources

J4vv4D Security Blog

J4vv4D Security Blog

Liquid Matrix

Liquid Matrix

Malcovery Security Blog

Malcovery Security Blog

Malware Don't Need Coffee

Malware Don't Need Coffee

McGrew Security Blog

McGrew Security Blog

Network Security Podcast

Network Security Podcast

New School Security

New School Security

NoVA Infosec

NoVA Infosec

Packet Pushers Podcast

Packet Pushers Podcast

Security Affairs

Security Affairs

Security Bisto

Security Bisto

Security Geeks

Security Geeks

Security Musings

Security Musings



Click here to take a Cyber Security Online course for FREE





Stock Ticker
 


Subscribe to our Daily Briefs Email



Subscribe to our DAILY BRIEFS to receive
the latest cyberbriefs news by email


Cyberbriefs Archive


Top Users Clicked

VISITS TO Cyber Briefs

Tuesday July 22, 2014

Total number of visitors : 2182
Past 24 hours: 39
Past 31 days: 1243
Past year: 2182



Send Cyber Briefs Suggestions and Tips: