Not finding what you’re looking for?
The Corporate Cyberspace Menace You Don't Know
The business community may be both a back door and a front door to espionage activities that threaten U.S. national security. Hostile governments always have viewed companies that do business with their government as a possible conduit for valuable intelligence. But now that threat is extended to those companies’ own activities in the global economy.
Training Vital to Network Defense
U.S. military and government computer networks are under constant attack from a variety of shadowy online enemies. Until recently, these threats were individuals or small groups without any major financial support. But just as advances in technology are making solo hackers more dangerous, the nation also faces a growing cyber threat from well-funded and equipped groups backed by organized crime or nation-states.
Commercial Firm Warns of Threat to Federal Computers
Chalk it all up to Melissa, a computer virus that spread rapidly on the Internet and shut down entire e-mail systems. For both the computing public and the information security industry, the Melissa virus—named for a Florida lap dancer, of all things—was a huge wakeup call.
Countries Collaborate To Counter Cybercrime
It’s a small world after all. As the Internet continues to connect peoples across the globe, individuals and groups drawn to destruction find new ways to wreak havoc on communications and services. Now, government leaders are coming together with each other and the private sector to form a united front and fight back because a vulnerability in any region can wreak havoc globally. A new multilateral federation is combating cyberthreats and cyberterrorism, creating greater security in developing networks and stopping dangers before they spiral out of control.
Plan Revamps Security Clearance Process
Say the words “security clearance” in a conversation with defense contractors, and the vast majority has a tale to tell of long waits and missed opportunities. Those two words have people in Washington, D.C., talking too. For two years, the organizations in charge of the security clearance process have worked hard to improve it. But for many, the time for revamping the old is over, and the time for creating a new process has begun.
United Kingdom Sets up Electronic Borders
The United Kingdom is securing its border by throwing an electronic net around the entire nation. The U.K. Electronic Borders program, known as e-Borders, aims at keeping track digitally of every individual who enters or exits the country.
Guard Ready for Emergencies
Hurricanes here, manmade trouble there, disasters, disasters everywhere. Between Mother Nature running amok and human-borne disasters, Florida has its share of dangerous incidents. Fortunately, the state is putting new measures in place to protect its citizens, and sharing them with other states. A cutting-edge communications system has been developed to fill gaps in current capabilities and offer new resources to emergency responders, and it is ready to take on whatever the rest of 2008 (and beyond) decides to dish up.
Information Assurance is the Ultimate Joint Endeavor
Cyber warfare. Critical infrastructure. Increased threat. Information assurance—or information security—is not the endeavor it used to be. The democratization of the Internet has had the same, albeit unwelcome, effect on criminal cyberspace activities. The extensive incorporation of information systems and networks into every facet of our lives has created a web of vulnerability across the spectrum of society. A threat can emerge from anywhere at any time in virtually any form.
Patterns Emerge in Consolidating Data Centers
“It’s all about the data” is a popular expression today. More and more, we’ve come to realize that data is the central building block for protecting, processing, sharing and storing information. And, as government and industry data owners learn to believe in these realities, they quite often decide to establish their own data centers to maintain control. On the surface, this might easily seem like the right thing to do, but it isn’t always the best course to achieve effective consolidation. Being aware of data center consolidation experience and realities can save organizations large sums of money and improve operations.
Remember to Look Next to You When Eliminating IA Threats
Have you installed the best door locks, burglar alarms and motion sensitive lights available? Is Spot, your Doberman/pit bull/wolf family pet awake, alert and a little hungry? Does your exterior resemble a bunker with siding that could withstand a force five hurricane? Then what’s that sound of something destroying your home? A possible answer; termites, the threat from within. Your mission critical data could be at as much risk.