Scholarship program targets need for cybersecurity skills – GCN.com

Scholarship program targets need for cybersecurity skills
GCN.com, DC
After leaving George Washington with a master’s degree in computer science and a graduate certificate in computer security and information assurance, she became director of wireless security at the Justice Department and later was appointed deputy

Source: Scholarship program targets need for cybersecurity skills – GCN.com

Computer attacks prompt call for national cyber-security czar – Miami Herald

WASHINGTON — Cyber-hackers believed to be based in China have tapped three times into the computer network in U.S. Sen. Bill Nelson’s office, the Florida Democrat said Friday. Two attacks on the same day this month and another one last month …

Source: Computer attacks prompt call for national cyber-security czar – Miami Herald

this San Francisco Chronicle article – San Francisco Gate

“It is a nasty worm that has a great deal of intelligence,” said Brian Grayek, who heads product development at Computer Associates, a security vendor that analyzed the Trojan Horse. The virus, which Computer Associates calls Mocmex, recognizes and …

Source: this San Francisco Chronicle article – San Francisco Gate

Comodo Endpoint Security Manager protects enterprise data with DDP™ – pressbox.co.uk

Jersey City, NJ, March 12, 2009 – Rather than permit executable computer files to install themselves unless they appear on a blacklist, Comodo’s Endpoint Security Manager protects enterprise data on a revolutionary new model: default-deny protection …

Source: Comodo Endpoint Security Manager protects enterprise data with DDP™ – pressbox.co.uk