05/23/2013 - Author Edward Amoroso proposes ideas for the implementation of a National Infrastructure Protection Criteria. The proposed framework defines 10 criteria, and then identifies functions associated with each. The 10 criteria are deception, separation, diversity, commonality, depth, discretion, collection, correlation, awareness, and response.
Daily Headline : Proprietary Information Protection
05/23/2013 - After a series of high-profile attacks, Twitter Inc. is implementing new security measures to stop hackers from invading user accounts. On Wednesday, the micro blogging site announced it will allow users to set their accounts to two-factor authentication.
04/24/2013 - Authorities say that the suspects in the Boston bombings were self-radicalized, charges are dropped against the man arrested in the ricin case, and cooperation between the United States and the European Union on terrorism is strained by privacy concerns.
04/13/2013 - Join Martin Drew, CPP, of iView Systems for a May 22 Webinar on applying advanced data analytics to identify significant variations from the “norm” and to quantify regions of risk. Drew will be joined by Dean Correia, Emeritus Faculty, Security Executive Council. They will also discuss Industry research related to incident reporting.
03/29/2013 - It's not so easy to compile cell phone databases that can be used without revealing the original sources. A new virus appearing across the country locks victims computers and makes them think it's been done by the Department of Homeland Security or the FBI and can't be unlocked until they pay a fine. A look at decriminalization of drugs in Portugal twelve years after the change in policy. And more.
03/28/2013 - For a few hundred dollars in start-up money and a few hundred more a month, anyone can buy the tools and services they need to build and run a malicious botnet. That's just one of the reasons the cyberlandscape is so hard to police.
02/27/2013 - Security industry professionals have made tremendous headway in developing and improving secure technologies over the past few decades. Creating more sophisticated methods of authentication, combating malware and spam, and battling the threat of cybercrime head-on are just a few of the advancements in the industry lauded by Scott Charney, corporate vice president of trustworthy computing at Microsoft. He spoke on Tuesday at the RSA Conference in San Francisco, California.
02/06/2013 - Concerns are being raised about the European Commission's new cybersecurity strategy. Estonia is the poster child for cybersecurity. Homeland Security Secretary Napolitano says insistence that the border be secured before immigration reform is a flawed argument. A new GAO report says that the FCC was lax in security control for the Enhanced Secured Network Project.