|
The survey explored the security
implications of social networking and the use of personal devices in
the enterprise. The survey polled 500 IT security professionals across
the United States, Germany, Japan, China and India and came up with
findings that are striking but neither unexpected nor unanticipated.
While announcing the result of the survey, Cisco informed that the
results illustrate that the consumer influence on enterprise IT is
growing and that more employees are bringing personal devices and
applications into the network. This is serious because on the one hand,
it is opening up new business opportunities and on the other hand it is
throwing open new security challenges.
The survey took a close scrutiny of the changing enterprise security
landscape that is being shaped up by the evolving requirements of todays
borderless networks. The survey also examined the benefits and
drawbacks of accommodating an increasingly mobile workforce, and the
challenges of protecting sensitive and proprietary data, as part of the
changing enterprise security scenario.
|
ATM Security Flaws |
06/30/2010
|
|
A security expert has identified
flaws in the design of some automated teller machines that make them
vulnerable to hackers, who could make the ubiquitous cash dispensers
spit out their cash holdings.
|
|
The Homeland Security and
Governmental Affairs Committee yesterday unanimously approved a major
cybersecurity legislation that would structure how the federal
government protects public and private sector cyber networks.
Crafted by Ranking Member Susan Collins and Sens. Joe Lieberman and Tom
Carper, the Protecting Cyberspace as a National Asset Act of 2010 calls
for the creation of a White House Office of Cyberspace Policy to
spearhead federal and private sector efforts to secure critical cyber
networks and assets. The office would be headed by a Senate-confirmed
director who would be accountable to the public. The bill also creates a
new center within the Department of Homeland Security to adopt
cybersecurity policies related to federal and private sector networks.
|
Poll of IT Security Professionals with
Suprising Results |
06/28/2010
|
|
People who work for big
companies are consistently ignoring the security policies of their
employers to use banned social networking apps and their own phones and
computers at work.
This is the headline finding of a poll of 500 IT security professionals
conducted by Cisco. Some 68 per cent of the respondents know their
employees use unsupported social networking applications.
|
Can Schools Discipline for Web Posts? |
06/10/2010
|
|
A U.S. appeals court heard
arguments Thursday over whether school officials can discipline students
for making lewd, harassing or juvenile Internet postings from
off-campus computers.
Two students from two different Pennsylvania school districts are
fighting suspensions they received for posting derisive profiles of
their principals on MySpace from home computers. The American Civil
Liberties Union argued that school officials infringe on student's free
speech rights when they reach beyond school grounds in such cases to
impose discipline.
|
Google Is Big Brother |
06/09/2010
|
|
If you have a Google e-mail
account, use Google search, and see online ads that are served by
Googles DoubleClick, the chances are good that Google knows more about
you than you might want to share with your significant other.
We trust Google with an unprecedented amount of our data--from our
entire search history (Web History), e-mail (Gmail), physical location
(Latitude), to maybe even our health records (Google Health). Google
stores massive amounts of data about our activities on its servers. And
therein lies a privacy paradox. Why is it that we storm the gates of
Facebook when it changes its privacy policy, but give Google a pass when
it comes to the massive amounts of data that it collects on us?
|
China Allowing Sites Through |
06/08/2010
|
|
Some websites, including ones
with pornography, that were previously blocked by Chinas Internet
censors were accessible inside the country Friday, though reasons for
the change were unclear.
|
Flash Security Hole |
06/07/2010
|
|
Adobe has issued a security
advisory about a critical vulnerability in its Flash Player and
Adobe Reader and Acrobat products that it says could let attackers take
control of people's computers.
The company said late Friday that there had been reports of the hole
actually being exploited and that an official patch was not yet
available.
|
PageGate - SMS Gateway Software |
06/02/2010
|
|
Send sms and text messages from
existing applications using PageGate
software. Receive alerts of system failures or other events.
|
Software Industry Conference |
06/01/2010
|
|
The 20th Annual Software Industry Conference
will be held on July 15 - 17, 2010 in Dallas, Texas at the Hyatt
Regency DFW Hotel.
The Software Industry Conference is a three day event that culminates
with a Networking Gala Dinner that gives software developers and
publishers an opportunity to form partnerships and alliances. The
conference also includes dozens of informative, educational breakout
sessions covering a wide variety of topics that are critical to the
success of Independent Software Developers (ISVs).
The conference includes more than forty educational seminars and
presentations that are designed to help developers sell more software.
Presentations by industry experts include topics such as profiting from
Google Adwords, marketing more effectively, providing income-producing
customer support, working with translation and localization services,
sending press releases, developing Software as a Service (SaaS)
applications, avoiding legal pitfalls, reducing chargebacks, and
creating affiliate networks.
The conference allows plenty of time to network with other software
developers and software industry service providers. The
conveniently-located daily breakfasts in the Hyatt Regency DFW Hotel
make it easy for conference attendees to meet and socialize with fellow
industry members. You can even attend the annual meetings and luncheons
of two industry trade associations, ESC and ASP.
The casual SIC conferences are known for their family-friendly
atmosphere. Many software developers turn their trips to SIC into
mini-vacations.
As always, the conference will present awards to honor developers in
several key software categories. SIC's Exhibit Night features the best
software development products and services from leading industry
vendors.
Registration at the door costs $299(US), or costs $249 if you register
online http://www.sic.org/register.asp
by July 13. Deeply discounted hotel rooms at the Hyatt Regency DFW are
available to all conference attendees.
|
Reputation Online |
05/31/2010
|
|
Social networking, and the
broader concept of online privacy, have been under some rather intense
scrutiny over the past couple of weeks. The issues at Google--voracious
indexer of all things Internet, and Facebook--the largest social network
and number one most visited site have made many users more acutely
aware of what information is available about them on the Internet.
However, your online reputation is being used in ways you may not be
aware of, and could cost you.
|
Current Blog
2010 Securty Blog Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July
Archive
June
Archive
May
Archive
April
Archive
March Archive
February
Archive
January
Archive
2008 Security Blog Archive
December
Archive
November Archive
October
Archive
September
Archive
July-August
Archive
May-June
Archive
April
Archive
March Archive
February
Archive
January
Archive
2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June
Archive
May Archive
April Archive
March Archive
February Archive
January Archive
2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
|