INFORMATION

Site Map - IT

SSH Communications Security Makes Its Assessment Tool Available for Free

- SSH Communications Security, the company that invented the Secure Shell (SSH) protocol for data in transit, announced that it will be making its SSH Risk Assessor (SRA) tool freely available.

Morning Security Brief: SIM Card Security Flaw, Faster Airport Screening, EU Blacklists Hezbollah, and More

- A flaw in the encryption technology used in many SIM cards could make cell phones vulnerable, the U.S. government is offering expedited security screening at airports for a fee, European Union ministers meeting in Brussels today placed Hezbollah on its list of terrorist organizations, and more.

Morning Security Brief: Cybersecurity Funding Up in Defense Budget, Update on Egypt, and PC Security

- The U.S. federal budget is allocating more money to the Defense Department for cybersecurity than ever before; unrest continues in Egypt, and Windows version 8.1 will have enhanced security including the support of biometrics.

Morning Security Brief: Encryption Thwarts Wiretaps, Lawmakers Discuss Irregular Warfare, and Education Efforts Questioned

- The U.S. government says that encryption has thwarted wiretaps for the first time, a House of Representatives committee discusses irregular warfare and the private sector, and a report questions the effectiveness of the government’s security education efforts.

Morning Security Brief: DNA Debate, Secret Surveillance Court Documents Ruling, and More

- Civil rights groups are asking why the U.K. government has been sending DNA samples from terrorism suspects to police agencies around the world with no oversight; the secret Foreign Intelligence Surveillance Court releases a ruling; and President Obama makes little headway on cybersecurity issues with China’s President Xi.

Government Too Slow in Addressing Cyberthreat, says General Michael Hayden

- Cybertechnology stands alongside land, sea, air, and space as the newest domain, but it is also the newest category of weapon, and the government is slow in addressing its dangers, said General Michael Hayden, former head of the National Security Agency and former CIA director, speaking at a Washington, D.C., cybersecurity forum sponsored by Kaspersky Lab earlier this week.

What Companies Need to Know About Data Retention

- Experts urge companies to revisit their data retention policies to ensure that they are culling information archives effectively.

Morning Security Brief: Cybersecurity Dangers, New Deadly Tornadoes in Oklahoma, and More

- Defense Secretary Chuck Hagel told reporters that he plans to address cybersecurity on his trip to Asia, three scientists were among those killed by a tornado in Oklahoma on Friday, and a government program to detect corrosion in infrastructure lacks follow-through.

Cyber Attacks: Protecting National Infrastructure, Student Edition

- Author Edward Amoroso proposes ideas for the implementation of a National In­fra­structure Protection Criteria. The proposed framework defines 10 criteria, and then identifies functions associated with each. The 10 criteria are deception, separation, diversity, commonality, depth, discretion, collection, correlation, awareness, and response.

Twitter Implements Two-Factor Authentication But Critics See Flaws

- After a series of high-profile attacks, Twitter Inc. is implementing new security measures to stop hackers from invading user accounts. On Wednesday, the micro blogging site announced it will allow users to set their accounts to two-factor authentication.

Morning Security Brief: Boston Suspects Worked Alone, Charges Dropped in Ricin Case, and EU Has Privacy Concerns

- Authorities say that the suspects in the Boston bombings were self-radicalized, charges are dropped against the man arrested in the ricin case, and cooperation between the United States and the European Union on terrorism is strained by privacy concerns.

Cybersecurity: Public Sector Threats and Responses

- Author Kim Andreasson provides an over­view of how government agencies and other public-sector groups can use the Internet without introducing unnecessary risks to their constituents.

Learn About Security Metrics, Data Analytics, and Visualization of Security Operations

- Join Martin Drew, CPP, of iView Systems for a May 22 Webinar on applying advanced data analytics to identify significant variations from the “norm” and to quantify regions of risk. Drew will be joined by Dean Correia, Emeritus Faculty, Security Executive Council. They will also discuss Industry research related to incident reporting.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.