Cyber security is probably the most heavily researched endeavor in all of computer science.
FORBES: Why Rockefeller-Snowe's Regulations Won't Prepare The U.S. For Cyberwar
Increased the focus on cyber security which he sees as being comparable to the arms race.
As an aside: The military implications of cyber security have been amply demonstrated in recent years.
FORBES: WikiLeaks Fallout is Bullish for Boeing, Airbus and United-Continental
Hopefully, the federal government will play a meaningful role in our cyber security future.
FORBES: Investing Opportunity: Prepping For Cyber Pearl Harbor
In addition, the agency would assume responsibility for cyber security from Commerce and the FBI.
Tellingly, out of the funds available only a small percent went to cyber security.
FORBES: Security Experts Warn State Governments Face Losing Battle With Hackers
For the policy side, cyber security is a hot topic in Congress as well.
FORBES: How Secure is the 'Cloud in Your Pocket?' Someone is Making It Bulletproof.
Sound corporate governance practices should also include disclosure of the risks posed by breaches of cyber security.
FORBES: Disclosing Cyber Security Incidents: The SEC Weighs In
Both, the generic as well as the specific definitional objectives of cyber security appear to be reasonable.
For this reason, the administration is pursuing a comprehensive cyber security approach to securing our digital infrastructure.
We noted our support for the efforts of ASEAN and the ARF in addressing cyber security matters.
WHITEHOUSE: Joint Statement of the 4th ASEAN-U.S. Leaders' Meeting
The militarization of cyber security policy will be very difficult in a liberal society with private infrastructure providers.
Another discussant suggested getting back to the core duty of collective security, including cyber security and missile defense.
FORBES: NATO's Lack Of Any Serious Purpose Means It Should Retire
And we integrating cyber security into the designs of systems rather than bolting it on as an afterthought.
"It's a cat-and-mouse that has no end, " says David Dagon, a professor of cyber security at Georgia Tech.
As a general principle, as you know, the President put forward a strategy on cyber security quite recently.
Fergus Ewing will oversee the formation of a cyber security action plan to help protect business and individivduals.
Bishop is also familiar with the way Pacific Command conducts operations, including how it uses cyber security, Crutchfield said.
One of the greatest challenges to strengthening cyber security is that new technology has been reactive rather than preventive.
FORBES: How Secure is the 'Cloud in Your Pocket?' Someone is Making It Bulletproof.
On the policy side of cyber security, legislation has been written around legacy technologies that are no longer relevant.
FORBES: How Secure is the 'Cloud in Your Pocket?' Someone is Making It Bulletproof.
This post is the first in a four-part series called Cyber Security Revisited.
Cyber security might always be an uphill, defensive struggle as techniques and technologies raise the stakes on both sides.
The cyber security landscape is facing new pressure from a few key areas.
FORBES: Security Stocks Shine As Worms And Trojan Horses Pose As Friends On Facebook
While PC shipments continue to fizzle, mobile is one of the shining stars besides the cloud, cyber security and others.
FORBES: Apple, Qualcomm, Broadcom And More Make A Big Week For Mobile
In this regard cyber security shares the same general empirical testing requirements as testing for the neutralization properties of antibiotics.
While these particular threats remain only a subset of cyber security concerns, their potential to increase dramatically is worth highlighting.
FORBES: Security Stocks Shine As Worms And Trojan Horses Pose As Friends On Facebook
And we agreed to deepen our cooperation on nuclear safety, clean energy and cyber security to enhance our economic competitiveness.
The greatest threat to global cyber security today, according to Internet Security Systems researcher Josh Corman, may be your mother's computer.
The method is known as DNS amplification, and is something that cyber security experts have known about for some time.
FORBES: 'Biggest Cyber Attack In History' Could Have Been Carried Out With Just A Laptop
Sony has hired cyber security firms to help investigate the recent massive security that affected more than 100 million user accounts.
应用推荐