Awards and Fellows
IEEE Computer Society is the computing professional's single, unmatched source for technology information, inspiration, and collaboration.
Digital Library Home
About the Digital Library
Access 29 magazines and journals and more than 4,450 conference publications in the Digital Library, the authoritative source for computing information.
Our high-quality journals, magazines, books, and conference publications represent the most up-to-date information in the computing world.
Conferences Publishing Services
Our technical conferences are a forum for top minds to come together to develop, validate, and disseminate leading-edge information.
Women In Computing
Join the community for technology leaders and receive a host of benefits, including access to the e-Learning campus, Computer magazine, conference and other discounts, and much more.
Jobs Board Blog
The one-stop job listing destination for technology professionals at any stage of their career, whether getting started, advancing, or transitioning.
Professional Development Courses
Stay up to date with current technologies with professional development courses, e-learning, webinars, and more.
TechLeader TrainingPartner Program
From training webinars and events to courses and certifications, IEEE Computer Society has the tools organizations need to train and retain top technical talent.
Board of Governors
Boards and Committees
Volunteer Resource Center
Get involved in a chapter, join a community, participate in a program board, or make an award nomination.
Subscribe to the BYC Newsfeed
A new nonprofit organization has been formed to provide career training that links returning US veterans to employers in need of qualified cyber security professionals through training and career placement. The Warriors to Cyber Warriors program is a six-month, tuition-free cybersecurity certification that gives veterans and wounded service members skills to transition from the military to a career as a cybersecurity professional.
Established by Lunarline, a cybersecurity services, training, and product company; and Echo360, a blended learning and lecture capture solutions provider; the program incorporates an NSA/CNSS certified cyber security training curriculum with a dedicated online community offering individualized mentoring, coaching and peer support to each veteran student. The first student cohort commences in June 2012. Applications for the second cohort are now being accepted. Starting salaries for graduates of the cybersecurity program can be up to $75,000 annually.
"As a Service-Disabled Veteran-Owned Small Business, Lunarline is fully committed to this project, having gone through this particular transition ourselves," said Lunarline CEO, Waylon Krush.
The program includes internships and career placement services with companies in need of cyber security talent. By connecting qualified applicants to established corporate employers, Warrior to Cyber Warrior assists Veterans with each step in the transition to a lifelong career. Warrior to Cyber Warrior is recruiting additional corporate partners in need of cyber security professionals to sponsor Veteran students.
The National Board of Information Security Examiners, through the US Cyber Challenge Initiative, is holding a Cyber Quest competition open to US high school and college students who will compete against their peers for an invitation to one of several summer Cyber Camps.
The Cyber Quest competition features a series of quiz questions based on analysis of a packet capture file which participants will analyze on their own machines, looking for signs of attack and other activity. Participants will have 24 hours from the time they begin the quiz to complete it. Winners will be determined based on who achieves the highest score in the shortest amount of time.
Winners of the Cyber Quest, who are 18 years or older and reside in or go to school in one of the Cyber Camp participating states will then be eligible to attend one of four week-long Cyber Camps being offered across the country in June and August. State-specific camps are being offered in Southern California and Delaware, while regional camps will take place in Northern Virginia and Northern California.
The camps will feature one week of specialized sessions by college faculty, SANS Institute senior instructors and cyber security experts, capped off by a live competition and awards ceremony on the last day. In addition to providing expert training for participants to improve their skills and marketability, the Cyber Camps will also provide students the opportunity to engage with major technology companies and government agencies at onsite job fairs for scholarship, internship and employment opportunities.
For more information, visit http://www.USCC.CyberQuests.org.
Cyber risks are still not getting adequate attention at the top, according to findings from the 2012 Carnegie Mellon CyLab Governance survey of how corporate boards and executives are managing risks.
Boards and senior management still are not engaging in key oversight activities, such as setting top-level policies and reviews of privacy and security budgets to help protect against breaches and mitigate financial losses, the survey found. Even though there are some improvements in key "regular" board governance practices, less than one-third of the respondents indicate their boards and senior executives are undertaking basic responsibilities for cyber governance.
Although improvements are shown in the formation of board Risk Committees and cross-organizational teams within their organizations, nearly half of the respondents indicated that their companies do not have full-time personnel in key privacy and security roles, and 58 percent of the respondents said their boards are not reviewing their companies' insurance coverage for cyber-related risks.
The survey recommends that executives establish the "tone from the top" for privacy and security. They should also review roles and responsibilities for privacy and security and ensure they are assigned to qualified full-time senior level professionals, and that risk and accountability are shared throughout the organization.
In addition, annual IT budgets for privacy and security should be kept separate from the CIO's budget and annual reviews of the enterprise security program should be conducted.
The survey, sponsored by RSA, The Security Division of EMC, was the third conducted by CyLab Adjunct Distinguished Fellow Jody Westby. Using the Forbes Global 2000 list, the 2012 survey represents the first analysis of cyber governance postures of major corporations around the world.
The US Department of Commerce's Internet Policy Task Force is recommending that the government and stakeholders come together to promote security standards to address an onsalught of security breaches.
"Protecting security of consumers, businesses, and the Internet infrastructure has never been more difficult. Cyberattacks on Internet commerce, vital business sectors, and government agencies have grown exponentially," said Secretary of Commerce Gary Locke in the new report., adding that some estimates peg the number of new Internet malware threats at 67,000 per day.
With more than 45 new viruses, worms, spyware, and other threats being created every minute – more than double the number from January 2009, security policy, technology, and procedures are struggling to stay ahead of the threats.
The report also proposes that the government continue to support both innovations in security and on the Internet more broadly. "We believe this framework will both improve security at home and around the world so that Internet services can continue to provide a vital connection for trade and commerce, civic participation, and social interaction around the globe," Locke said.
Data loss through cyberattacks decreased sharply in 2010, but the total number of breaches was higher than ever, according to the Verizon 2011 Data Breach Investigation Report. These findings continue to demonstrate that businesses and consumers must remain vigilant in implementing and maintaining security practices.
The number of compromised records involved in data breaches investigated by Verizon and the US Secret Service dropped from 144 million in 2009 to only 4 million in 2010, representing the lowest volume of data loss since the report's launch in 2008. Yet this year's report covers approximately 760 data breaches, the largest caseload to date.
According to the report, the seeming contradiction between the low data loss and the high number of breaches likely stems from a significant decline in large-scale breaches, caused by a change in tactics by cybercriminals. They are engaging in small, opportunistic attacks rather than large-scale, difficult attacks and are using relatively unsophisticated methods to successfully penetrate organizations. For example, only 3 percent of breaches were considered unavoidable without extremely difficult or expensive corrective action.
The report also found that outsiders are responsible for 92 percent of breaches, a significant increase from the 2010 findings. Although the percentage of insider attacks decreased significantly over the previous year (16 percent versus 49 percent), this is largely due to the huge increase in smaller external attacks. As a result, the total number of insider attacks actually remained relatively constant.
Hacking (50 percent) and malware (49 percent) were the most prominent types of attack, with many of those attacks involving weak or stolen credentials and passwords. For the first time, physical attacks -- such as compromising ATMs -- appeared as one of the three most common ways to steal information, and constituted 29 percent of all cases investigated.
For the second year in a row, the US Secret Service collaborated with Verizon in preparing the report. In addition, the National High Tech Crime Unit of the Netherlands Policy Agency (KLPD) joined the team this year, allowing Verizon to provide more insight into cases originating in Europe. Approximately one-third of Verizon's cases originated in either Europe or the Asia-Pacific region, reflecting the global nature of data breaches.
Lockheed Martin today announced its plans to support the US Cyber Challenge (USCC), an initiative designed to create a pipeline of cybersecurity professionals from high school through college and beyond. Its unique use of multiple and scalable talent competitions and talent development initiatives enables individuals to develop their skills, gain access to advanced training and achieve recognition with scholarships, internships and jobs.
"Protecting our competitive advantage and digital infrastructure requires the expertise of trained cyber security professionals. We realize that Lockheed Martin's leadership in cybersecurity and STEM efforts can only succeed through partnership with organizations such as the US Cyber Challenge," said Charles Croom, vice President of Cyber Security Solutions, Lockheed Martin Information Systems & Global Solutions.
Recent studies have shown that while there is a shortage of technical workers, the field of cybersecurity is rapidly evolving. In fact, former federal officials have estimated there are only 1,000 US security specialists with the skills necessary to operate in cyberspace and the country needs about 10,000 to 30,000 such professionals.
USCC—a division of the not-for-profit Center for Internet Security—develops and conducts online competitions and on-site camps where talented people will be discovered, nurtured, and progress toward careers as technical cyber security experts. The ultimate goal is to reduce the risk profile for the nation in the critical area of cyber security professionals.
Headquartered in Bethesda, Md., Lockheed Martin is a global security company that employs about 133,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. The corporation's 2009 sales from continuing operations were $44 billion.
Marketing Automation Platform
Marketing Automation Platform