Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Embassy Security
12/31/2012

Meeting congressional demands for more embassy security guards could be difficult for the U.S. Marine Corps even if funds are provided, a security analyst said.

Cyber Security Executive Order
12/30/2012

A cyber security executive order could be issued by President Obama as soon as early 2013, according to White House sources.

James Lewis, director of the technology and public policy program at the Center for Strategic and International Studies, told global affairs blog The Hill on Friday that the action would not likely occur after the holiday season.

Schools Re-evaluate Security
12/29/2012

When Americas second-deadliest shooting occurred nearly two weeks ago, the shocking news struck too close to home for school administrators across the country.

The mood in eastern Polk County is no exception, where Southeast Polk and Bondurant-Farrar superintendents began working with security advisers, building principals and other advisers to evaluate their safety measures.

During the week following the Friday shooting, Southeast Polk implemented a locked exterior door policy at its two most rural elementary buildings, which are farthest from emergency support, Runnells Elementary and Four Mile Elementary schools.

Top 10 Security Clearance Stories
12/28/2012

Top 10 Security Clearance stories you, the readers, made the most popular in 2012:

10. Navy detects Russian sub off U.S. East Coast
9. Imagine flying from New York to London in under an hour
8. Army to Congress: Thanks, but no tanks
7. New pictures show second Chinese stealth fighter being test flown
6. U.S. sends warships near Israel in case evacuation needed
5. Army general faces possible court-martial on sexual conduct, other charges
4. U.S. had plans to nuke the moon
3. U.S. military beginning review of Syria options
2. Air Forces hypersonic test fails
1. FIRST ON CNN: Iranian jets fire on U.S. drone

Home Security Tips
12/27/2012

While the winter weather conditions can be harsh, this often does not deter home invaders from breaking into homes. Many people know of the increased threat during the holidays, but home break-ins occur at any time of the year, despite the weather. It is important for homes to be protected from threats during the winter, just as they would be during the warmer months.

The security experts at SecuritySystemReviews.com, a site providing the best home security system reviews, put together a list of steps homeowners can take to protect their home and family during the frigid winter months.

1.    Always ensure home security system equipment is in proper working order. Equipment can be vulnerable to malfunction during severe weather, such as ice or snow storms, so it should be checked frequently during the winter months to make sure it is working properly.

Patriot Deployment to Turkey
12/24/2012

U.S. troops will be in direct position for the first time to take action against the government of Syrian President Bashr al-Assad with the deployment of 400 American forces and two Patriot missile batteries in Turkey, possibly as soon as mid-January.

The missiles and troops will be under the overall control of NATO. But the missiles will be operated by U.S. forces with the ability to choose whether to override computer systems that automatically order firing against any incoming Scud missiles, according to U.S. military officials.

FIFA Security Plans
12/23/2012

FIFA officials have insisted their security plan for the 2014 World Cup in Brazil will prevent any repeat of the violent scenes that stopped the Copa Sudamericana final.

The violence followed confrontations between the players as they made their way from the pitch at half-time.

But FIFA assured people on there security plans.

Cloud Application Security
12/22/2012

Many IT organizations are not fully aware of which cloud applications are in use across the enterprise, making it difficult for enterprises to monitor and control user access to mission-critical applications and data, according to a survey of 400 IT and business at British and American companies with at least 5,000 employees.

The report, conducted by research firm Loudhouse on behalf of identity management solutions provider SailPoint, found enterprises are running one-third of their mission-critical applications in the cloud today and expect to have half of all critical applications running in the cloud by 2015. While business users have gained more autonomy to deploy cloud applications without IT involvement, they do not feel responsible for managing access control. The survey found 70 percent of business leaders believe that IT is ultimately responsible for managing user access to cloud applications.

Sandy Hook Security Policy
12/16/2012

Dear Members of our Sandy Hook Family,

Our district will be implementing a security system in all elementary schools as part of  our ongoing efforts to ensure student safety. As usual, exterior doors will be locked during the day. Every visitor will be required to ring the doorbell at the front entrance and the office staff will use a visual monitoring system to allow entry. Visitors will still be required to report directly to the office and sign in. If our office staff does not recognize you, you will be required to show identification with a picture id. Please understand that with nearly 700 students and over 1000 parents representing 500 SHS families, most parents will be asked to show identification.

Doors will be locked at approximately 9:30 a.m. Any student arriving after that time must be walked into the building and signed in at the office. Before that time our regular drop-off procedures will be in place. I encourage all parents to have their children come to school and return home on the bus and to remain in school for the entire school day. The beginning and ending of our school day are also important instructional times and therefore we want all our students to reap the benefits of full participation in our program.

We need your help and cooperation for our system to work effectively. Our office staff is handling multiple tasks. Though they will work diligently to help you into the building as quickly as possible, there may be a short delay until someone can view you on the handset and allow you to come in electronically.

Government Cyber Security Threats
12/21/2012

Nearly two months after publicly disclosing a massive data breach at the Department of Revenue, state officials are unsure just what kind of weaknesses exist in state agencies cyber security.

The State Budget and Control Board — the five-member board that oversees the state’s administrative agency as well as state financial decisions — took the first step to find out Wednesday when it authorized hiring a consultant to craft a bid for a firm to assess the states security and develop a statewide cyber security firm.

The board also approved a $20.1 million loan to the Revenue Department to handle some of the states response to the hacking.

Mergers and Acquisitions and Security
12/20/2012

American International Group - AIG $4.23 billion sale this week of its aircraft leasing business to a group of Chinese investors is subject to scrutiny by a little-known group that could technically scuttle the major acquisition by simply invoking national security concerns.

The Committee on Foreign Investment in the United States, or CFIUS, is an inter-agency panel that investigates foreign investment in U.S. companies by everyone from close allies like the U.K. to economic foes like China.

Basically, CFIUS is charged with ensuring sensitive national-security and critical infrastructure assets don’t fall into the hands of countries or groups aligned against the U.S.

JFK Airport Security Threaten a Christmas Strike
12/19/2012

Security guards at John F. Kennedy Airport are threatening to walk off the job this month.

The nonunion workers say they want better training and equipment.

A strike-authorization vote is set for Thursday or Friday. If approved, they could walk out on Dec. 20.

The 300 workers direct traffic in front of terminals and check tarmac gates to make sure they are secure, among other duties.

They work for two different companies, Air Serve and Global Elite Group.

Both companies say they are open to discussions with the workers.

Big Data Security
12/18/2012

When I talk to IT security pros today about how they manage and protect data, most describe grueling manual processes and makeshift solutions comprised of countless off-the-shelf products and fragile homegrown scripts.

Fortunately, most of us understand the importance of using automation to help fight our battles, but the rapidly changing landscape of new technologies, security threats, and paradigm shifts makes it difficult to stay ahead of the curve.  Choosing to specialize in the wrong technology can be career limiting, recommending the wrong technology to your boss can be career ending.

When a new buzzword like big data starts to take off, we have the right to be skeptical. Is there something really new and important, or is it just hype? Is this going to change the how we do things for years to come, or is it just a distraction? How do we really use it?

At Infosecurity Europe 2012, we conducted a survey to determine what IT security professionals were thinking about big data.  Over 180 attendees responded, answering questions about whether they thought the definition of big data itself was clear, whether it is or will be a priority for their organizations, and how they might like to use it.

Fast Airport Security for Chosen Few in Nashville
12/17/2012

Nashville International Airport opened two new priority lanes at security checkpoints earlier this week for business and frequent flyers on select airlines.

School District Address Security Concerns
12/16/2012

School districts throughout the area were taking a second look at their security plans in the wake of the horrific shootings in Connecticut, but at least one local school official said it’s impossible to guarantee total safety for children.

School Security Concerns
12/15/2012

In the wake of the carnage, school officials and experts said they expect — and understand — that a deluge of concerns and questions from parents lies ahead. They also remained firm that despite episodes of extreme violence such as the incident in Connecticut, campuses are generally safe and remain a haven for students.

In the years since the 1999 mass shooting at Columbine High School in Colorado, schools nationwide have bolstered security measures. The biggest trends have been placing more police officers — rather than security guards — on campus, installing metal detectors and adding sophisticated locking systems on buildings.

Schools have also worked on developing robust emergency plans and have trained educators on how to respond to crises on campus, said Sonayia Shepherd, an analyst at Safe Havens International, a nonprofit that advises thousands of K-12 schools on safety and security.

Best Home Security
12/14/2012

Home Security Journal declares FrontPoint Security as having the best product for anyone looking for a trustworthy and totally reliable home security system. They have taken several aspects of this company into consideration such as customer service, flexibility, convenience, transparency, terms and conditions, and equipment used. FrontPoint stands out in the following areas.

WordPress Security
12/13/2012

The best WordPress website security you can buy is a good backup. It will not prevent your site from being hacked, but it will make recovery much faster and will help you avoid the worst case scenario—destruction of all of your data.

If you do not have a good backup service, I suggest you stop reading this article right now and go find one. Then come back and read about all the ways to enhance your WordPress website security so that you never need to use your backup service.

Password Blacklist
12/12/2012

A report emerged this week suggesting that RIMs latest mobile operating system, BlackBerry 10, will disallow certain words as passwords in order to bolster consumer and enterprise messaging security.

Security Cuts
12/12/2012

The U.S. border might become harder to protect should lawmakers fail to avert the so-called fiscal cliff at the end of the year.

Among the many agencies that would be affected by the automatic spending cuts scheduled for early January are those that guard the borders with Mexico and Canada, inspect ports of entry and monitor airport security. Officials and policy analysts have warned that drug smugglers and human traffickers might be able to exploit a weaker border as patrol agents would be fired by the thousands and tens of millions of dollars for the border fence would be cut.

PCI Security Standards
12/11/2012

With the formation of the PCI Security Standards Council, multichannel merchants, online retailers, consultants, payment processors, and virtually every organization that touches online payments should find it much easier to comply with the PCI Data Security Standard.

The newly formed council also will make it possible for merchants, acquiring banks and others to have a voice in helping to craft the standard as it goes forward.

Homeland Security Waste
12/10/2012

The Homeland Security Department paid for an underwater robot in a Midwest city with no major rivers or lakes nearby, a hog catcher in rural Texas and a fish tank in a small Texas town, according to a new congressional report highlighting what it described as wasteful spending of tax money intended for counterterrorism purposes.

Need Security Company Branding?
12/09/2012

Great logo designs for security related businesses.

Security Gift Ideas
12/08/2012

Great ideas for security professionals

Security and Privacy
12/07/2012

Congress has been looking at data security and privacy for years, and the Federal Trade Commission has done a lot of work on the issues, studying them and creating best practices for protecting against violations. But as of right now, for the most part, data security and privacy are issues mainly addressed at the state level, and virtually all states have some laws on the books.

Unfortunately, a survey NAR conducted in 2010 found that real estate brokers and sales associates are neither well-informed about these laws nor have in place anything close to a rigorous system for protecting against security breaches, or protecting customers privacy.

Hackers Attack Atomic Energy Agency
12/06/2012

A group of hackers leaked email contact information of experts working with the International Atomic Energy Agency after breaking into one of the agencys servers.

The group published a list of 167 email addresses along with its manifesto on Sunday in a post on Pastebin

Secure Priveledged Access
12/05/2012

It is a battle to protect the privileged. But in this case, it is not the 1%. This is about privileged access accounts within critical infrastructure control systems.

It should be no surprise that cybercriminals have figured out that privileged access is better than regular access. But they have also learned that privileged access points to CI control systems remain vulnerable.

Free Radios for Security
12/04/2012

The Indiana Department of Homeland Security is again partnering with local emergency management agencies to give away close to 8,500 all hazards alert radios to at-risk Hoosiers throughout the state.

Biometric Security is Not Foolproof
12/03/2012

Security is always inconvenient, and people — police people in particular — seem to strive constantly to defeat security measures intended to protect themselves, their property, or the assets of their employers.

Locked doors are propped open or the latches taped over; keys are left accessible to anyone who happens by the hook they’re hung on.

Biometric measures like iris scans and fingerprint readers offer what seems like a secure means of maintaining security without having to carry a card or key or remember a password, and these methods are mostly reliable. Recently, a flaw in a fingerprint reader used on many laptop computers was revealed to expose passwords stored in the Windows registry.

Cyber Attacks Continue
12/02/2012

Cyber attacks, cyber crime and network threats are increasing in volume, intensity, and sophistication as 2013 approaches. Such attacks threaten our national security and do billions of dollars of damage to our economy. 2013 will usher a new set of cyber security challenges as our online economy and businesses continue to grow and broaden.

American Competitiveness an Issues of Security
12/01/2012

The American Security Project released a new report analyzing the issues of our national competitiveness. The report clearly lays out urgent social, political and economic challenges and links these with our national security.

The report details the issues with: business climate; infrastructure; national debt; labor market and immigration; defense industrial base; and, education and healthcare.



Current Blog

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.