Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog

 
Security Poll
06/30/2010

The survey explored the security implications of social networking and the use of personal devices in the enterprise. The survey polled 500 IT security professionals across the United States, Germany, Japan, China and India and came up with findings that are striking but neither unexpected nor unanticipated.

While announcing the result of the survey, Cisco informed that the results illustrate that the consumer influence on enterprise IT is growing and that more employees are bringing personal devices and applications into the network. This is serious because on the one hand, it is opening up new business opportunities and on the other hand it is throwing open new security challenges.

The survey took a close scrutiny of the changing enterprise security landscape that is being shaped up by the evolving requirements of todays borderless networks. The survey also examined the benefits and drawbacks of accommodating an increasingly mobile workforce, and the challenges of protecting sensitive and proprietary data, as part of the changing enterprise security scenario.

ATM Security Flaws
06/30/2010

A security expert has identified flaws in the design of some automated teller machines that make them vulnerable to hackers, who could make the ubiquitous cash dispensers spit out their cash holdings.

CyberSecurity
06/29/2010

The Homeland Security and Governmental Affairs Committee yesterday unanimously approved a major cybersecurity legislation that would structure how the federal government protects public and private sector cyber networks.

Crafted by Ranking Member Susan Collins and Sens. Joe Lieberman and Tom Carper, the Protecting Cyberspace as a National Asset Act of 2010 calls for the creation of a White House Office of Cyberspace Policy to spearhead federal and private sector efforts to secure critical cyber networks and assets. The office would be headed by a Senate-confirmed director who would be accountable to the public. The bill also creates a new center within the Department of Homeland Security to adopt cybersecurity policies related to federal and private sector networks.

Poll of IT Security Professionals with Suprising Results
06/28/2010

People who work for big companies are consistently ignoring the security policies of their employers to use banned social networking apps and their own phones and computers at work.

This is the headline finding of a poll of 500 IT security professionals conducted by Cisco. Some 68 per cent of the respondents know their employees use unsupported social networking applications.

Can Schools Discipline for Web Posts?
06/10/2010

A U.S. appeals court heard arguments Thursday over whether school officials can discipline students for making lewd, harassing or juvenile Internet postings from off-campus computers.

Two students from two different Pennsylvania school districts are fighting suspensions they received for posting derisive profiles of their principals on MySpace from home computers. The American Civil Liberties Union argued that school officials infringe on student's free speech rights when they reach beyond school grounds in such cases to impose discipline.

Google Is Big Brother
06/09/2010

If you have a Google e-mail account, use Google search, and see online ads that are served by Googles DoubleClick, the chances are good that Google knows more about you than you might want to share with your significant other.

We trust Google with an unprecedented amount of our data--from our entire search history (Web History), e-mail (Gmail), physical location (Latitude), to maybe even our health records (Google Health). Google stores massive amounts of data about our activities on its servers. And therein lies a privacy paradox. Why is it that we storm the gates of Facebook when it changes its privacy policy, but give Google a pass when it comes to the massive amounts of data that it collects on us?

China Allowing Sites Through
06/08/2010

Some websites, including ones with pornography, that were previously blocked by Chinas Internet censors were accessible inside the country Friday, though reasons for the change were unclear.

Flash Security Hole
06/07/2010

Adobe has issued a security advisory about a critical vulnerability in its Flash Player and Adobe Reader and Acrobat products that it says could let attackers take control of people's computers.

The company said late Friday that there had been reports of the hole actually being exploited and that an official patch was not yet available.

PageGate - SMS Gateway Software
06/02/2010

Send sms and text messages from existing applications using PageGate software. Receive alerts of system failures or other events.

Software Industry Conference
06/01/2010

The 20th Annual Software Industry Conference will be held on July 15 - 17, 2010 in Dallas, Texas at the Hyatt Regency DFW Hotel.

The Software Industry Conference is a three day event that culminates with a Networking Gala Dinner that gives software developers and publishers an opportunity to form partnerships and alliances. The conference also includes dozens of informative, educational breakout sessions covering a wide variety of topics that are critical to the success of Independent Software Developers (ISVs).

The conference includes more than forty educational seminars and presentations that are designed to help developers sell more software. Presentations by industry experts include topics such as profiting from Google Adwords, marketing more effectively, providing income-producing customer support, working with translation and localization services, sending press releases, developing Software as a Service (SaaS) applications, avoiding legal pitfalls, reducing chargebacks, and creating affiliate networks.

The conference allows plenty of time to network with other software developers and software industry service providers. The conveniently-located daily breakfasts in the Hyatt Regency DFW Hotel make it easy for conference attendees to meet and socialize with fellow industry members. You can even attend the annual meetings and luncheons of two industry trade associations, ESC and ASP.

The casual SIC conferences are known for their family-friendly atmosphere. Many software developers turn their trips to SIC into mini-vacations.

As always, the conference will present awards to honor developers in several key software categories. SIC's Exhibit Night features the best software development products and services from leading industry vendors.

Registration at the door costs $299(US), or costs $249 if you register online http://www.sic.org/register.asp by July 13. Deeply discounted hotel rooms at the Hyatt Regency DFW are available to all conference attendees.

Reputation Online
05/31/2010

Social networking, and the broader concept of online privacy, have been under some rather intense scrutiny over the past couple of weeks. The issues at Google--voracious indexer of all things Internet, and Facebook--the largest social network and number one most visited site have made many users more acutely aware of what information is available about them on the Internet. However, your online reputation is being used in ways you may not be aware of, and could cost you.



Current Blog

2010 Securty Blog Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.