Categories
-
Recent Posts
- Microsoft Open-Sources ‘CyberBattleSim’ Enterprise Environment Simulator
- CISA Releases Tool to Detect Microsoft 365 Compromise
- LG Promises Three Years of OS Updates for Premium Android Smartphones
- Pwn2Own 2021 Participants Earn Over $1.2 Million for Their Exploits
- Collaboration Platforms Increasingly Abused for Malware Distribution, Data Exfiltration
Tag Cloud
- Apple
- arshnet
- Aurora Vulnerability
- Authentication
- Bill
- CERT
- Computer Security
- Conficker
- Conficker.C Domain Collisions
- critical security vulnerability
- CSIS
- cyber-compartmented
- Cyber Assault
- Cyber Attack
- cyber attacks
- cyberattacks
- Cyber Crime
- Cybercrime
- cybercriminals
- Cyberczar
- cyber infrastructure
- CyberJobShop
- Cybersecurity
- Cyber Security
- Cyber Security Czar
- cyber security professionals
- Cybersecurity review
- cybersecurity strategy
- cyberspace
- Cyber Terrorism
- electronic attack
- Forensics Tools
- G:7-Security
- hackers
- Homeland Security
- Honeynet Project
- https
- Information Security
- Information Warfare
- Infosecurity Europe
- Internet Security
- Internet switch
- Intrusion Detection Signatures
- isecurity
- IT security
- Jay Rockefeller
- keychain
- Memory Disinfector
- national cybersecurity
- National Cybersecurity Advisor
- Network Security
- NIST compliance
- Pentagon
- Risk Management Strategies
- S773
- S778
- Secure DNS
- Secure Webmail
- Security
- Security Auditing and Logging
- Security Breach
- security experts
- security news
- security policies
- security standards
- Security Threat
- security threats
- Security Toolkit
- software vulnerabilities
- U.S. Senate
- US-CERT
- US Cyber System
- vulnerabilities
- White House
Pages
@iSecurity
Top Posts
- TryHackMe — RaceTrack Bank Walkthrough
- Microsoft Open-Sources 'CyberBattleSim' Enterprise Environment Simulator
- Microsoft: Ongoing, Expanding Campaign Bypassing Phishing Protections
- Vulnerability in 'Domain Time II' Could Lead to Server, Network Compromise
- Belden Says Health-Related Information Exposed in Data Breach
- Library Dependencies and the Open Source Supply Chain Nightmare
- Collaboration Platforms Increasingly Abused for Malware Distribution, Data Exfiltration
- CISA Releases Tool to Detect Microsoft 365 Compromise
Tag Archives: White House
5 Duties of a Cybersecurity Czar
5 Duties of a Cybersecurity Czar Responsibilities of White House Official Defined Eric Chabrow, Managing Editor May 1, 2009 Legislation creating a White House director of cyberspace would give that official five distinct authorities and functions if enacted. Here’s the … Continue reading
Posted in Cyber Security
Tagged Cybersecurity Czar, cyberspace, Information Security, White House
Leave a comment
White House Set To Reel-In Cybersecurity Role?
By Marc Handelman on April 24th, 2009 In news from the RSA Conference 2009, comes an apparent ‘put on notice’ speech by the acting cybersecurity director from the White House. A 60 day review of cybersecurity initiatives promulgated by the … Continue reading