Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Security and SmartPhones
06/01/2012

Research in Motion has said the security of its smartphones is superior to that of its competitors phones. But companies specializing in security tools for Apples iOS and Google’s Android systems may give businesses another reason not to buy a BlackBerry.

Online Reputation Protection
05/31/2012

Google is sometimes thought to be the bane of the Internet, and it certainly can be a thorn in the side of search engine marketers. Many fail to look beyond the search of today, toward what the implications of indexing and storing information will have on future generations. Forget the slogan diamonds are forever -- Google is forever is more accurate in regard to the Internet. And if not Google, then some other search giant will be able to retrieve information from previous years within a few seconds. If something is online, it does not just "go away". Like it or not, the entire world is being indexed and categorized, and will be searchable for years to come.

Online Reputation Management

Cyber Security Intelligence
05/30/2012

The Department of Defense is expanding a program aimed at increasing the sharing of security intelligence between the Pentagon and critical infrastructure companies.

The Pentagon is expanding a cyber-security program meant to promote information sharing between the private and public sector.

In partnership with the Department of Homeland Security, the Department of Defense announced on May 11 that it is expanding its Defense Industrial Base Cyber Security/Information Assurance Program  to all eligible companies.

The goal of the program is to improve network defenses and reduce potential damage to critical programs when defense information is compromised.  As part of the program, the DoD shares information with companies handling DoD data that they can review or act on to improve security.

Sonic Weapon Part of Olympic Security
05/29/2012

A sonic weapon used to ward off pirates attacks and drive back rioting crowds will be part of the security arsenal at the London Olympics, Sky News reported Saturday.

The American-built long-range acoustic device LRad can emit a highly focused beam of sound at a pain-inducing 150 decibels, louder than the takeoff of military jets and just below the instant perforation of an eardrum.

The US army deployed LRad as a crowd control device during its struggles in post-war Iraq.

.Secure Domain
05/28/2012

A security startup called Artemis Internet has proposed a new .secure top-level domain that would require Web sites using the domain to maintain stringent security practices.

The goal is to offer a place on the Web where sites have higher security standards and Web surfers can have more faith that their data and communications will stay out of the hands of malicious hackers and criminals.

Negotiations
05/27/2012

Negotiation really is an art, and can be a challenge to master for even the most astute business professional. And like any art form, it must be refined and crafted. Getting a good deal can result in a feeling of euphoria. So, how does one negotiate a good deal? It can be difficult, especially if the other party appears to be holding all the cards. Follow these tips to help negotiate a great deal...

Negotiations

Professional Security Themed Logos
05/26/2012

Need a security logo design? Checkout the professional security logo designs.

Court Sides with Google on Security
05/25/2012

A federal appeals court has turned down a Freedom of Information Act request to disclose National Security Agency records about the 2010 cyberattack on Google users in China.

The Electronic Privacy Information Center, which focuses on privacy and civil liberties, sought communications between Google and the NSA, which conducts worldwide electronic surveillance and protects the U.S. government from such spying. But the NSA refused to confirm or deny whether it had any relationship with Google. The NSA argued that doing so could make U.S. government information systems vulnerable to attack.

Security PowerPoint Presentations
05/24/2012

Checkout these professional security themed PowerPoint presentations, templates and backgrounds.

Managing Your Reputation
05/23/2012

A companys reputation is often critical to that companys success. The anonymity and vastness of the Internet makes managing a reputation much more difficult than it once was. Businesses must be proactive about protecting their brands and reputations.

Brand Hijacking
Brand Hijacking refers to the act of someone other than authorized company personnel using the company brand as if they represent that brand. Unfortunately, brand hijacking is becoming increasingly more common in social media and on social networks. One of the best ways to minimize brand hijacking, while not foolproof, is to register the company brand and product names in all the social media channels, before anyone else has the opportunity to do so.

Managing Your Reputation

AT&T Home Security
05/22/2012

AT&T is moving beyond cellphone and Internet service and getting into home security.

The wireless giant on Monday announced plans for a new portfolio of all-digital, IP-based home security monitoring services. Called AT&T Digital Life, the services will give users unparalleled control and securityof their homes using any Web-enabled device such as PCs, tablets and smartphones regardless of wireless carrier.

Security Prep for Olympics
05/21/2012

Woe betide the hapless backpackers who stumble upon the Olympic Park in London’s East End this summer. They may feel the might of Britain’s biggest security operation since World War II come crashing down upon them.

Camping essentials like compasses and water bottles are just some of the items banned from Olympic venues in an attempt to avoid Occupy protests that have disrupted city centers and financial districts around the world.

Airport Security
05/20/2012

The latest attempt by Al Qaeda to make an underwear bomb designed to be detonated on a plane headed to the United States has set off a fierce debate among security officials in Washington and their critics in Congress about whether the current measures to protect airliners would have detected the bomb.

The debate has centered largely on the belief among officials of the Department of Homeland Security and the Transportation Security Administration that their so-called multilayered approach to security would have stopped such an attack.

McAffee Adds Security Partners
05/19/2012

McAfee announced eight new partners have joined the McAfee Security Innovation Alliance, McAfees technology partnering-program. With over 130 leading vendors participating in the Program, SIA is the security industry’s premier technology-partnering program, delivering solutions to maximize the value of existing customer investments while reducing time to problem resolution, and lowering overall operational costs.

Apple Lion Security Hole
05/18/2012

As you may have seen over the weekend, someone has discovered a security hole in FileVault, which arose with the OS X Lion security update, version 10.7.3, back in February: FileVault encryption passwords are now visible in plain text outside of a computers encrypted area.

The hole was apparently spotted by someone back in February, although it was most publicly first pointed out by security consultant David Emery on the Cryptome blog a few days ago and the rest of the blogosphere has run with it.

Now, it appears that the problem could be bigger than previously thought: it turns out that the developer who first noticed the hole back in February has discovered that it exists outside of FileVault, too, with at least one other company’s security encryption software, Lion VM, from VMWare Fusion, showing the same behavior.

Corruption in Security
05/17/2012

Facing an overwhelming backlog of corruption probes, the Department of Homeland Securitys watchdog agency will unload almost half of its investigations of employees suspected of wrongdoing, officials said last week.

The departments acting inspector general, Charles K. Edwards, said he will transfer control of approximately 360 corruption and misconduct case against employees at two agencies -- Immigration and Customs Enforcement, and Customs and Border Protection. Internal affairs offices at the agencies will instead handle the investigations.

Cloud Security Strategy
05/16/2012

Intel Corp. and its subsidiary McAfee on Friday unveiled a cloud security strategy they hope will overcome enterprise security concerns about cloud computing by bringing together Intels hardware-based security with McAfees security software.

Security for Cloud
05/15/2012

Cloud computing has clearly sparked the imagination of business leaders, who see it as a powerful new way to be innovative and gain first-mover advantages — with or without traditional ITs consent.

This simply now means that the center of gravity for IT services is shifting toward the enterprise’s boundaries – moving increasingly outside their firewalls. And so how can companies have it both ways — exploit clouds promise but also provide enough security to make the risks acceptable? How can organizations retain rigor and control while pursuing cloud benefits?

Apple Security
05/14/2012

Unless Apple changes its security update practice, nearly half of all Mac users will be adrift without patches sometime this summer.

Apple will launch OS X 10.8, aka Mountain Lion, in the next few months, and then will -- baring a change in a decade-old habit -- stop serving patches to OS X 10.6, or Snow Leopard.

Although Apple has never spelled out its support policy for older operating systems, it has always dropped an edition around the time it has two newer versions in play.

Cyber Security Cold War
05/13/2012

The cyber-security cold war is real and expanding. In December 2011, Bloomberg News reported that the networks of at least 760 companies, research universities, Internet service providers and government agencies were hit over the last decade by elite cyber spies who use a proverbial vacuum cleaner to suck IP out of organizations by the terabyte. Based on what is known of attacks from China, Russia and other countries, a declassified estimate of the value of the blueprints, chemical formulas and other material stolen from U.S. corporate computers in the last year reached almost $500 billion.

Privacy vs Security
05/12/2012

On the face of it, the Cyber Intelligence Sharing and Protection Act  that the U.S. House of Representatives just passed seems to address the long-held notion that encouraging private and public sector concerns to share security information will improve our general security.

And while the goal of CISPA is noble and the need warranted even coveted by some enterprises looking for a way to share information while reducing legal liability, the devil is in the details, and unfortunately CISPA goes too far in terms of trading off our liberties.

Olympic Security
05/11/2012

So how seriously is the British government's commitment to Olympic security? Well, it's sailing the largest carrier in the British naval fleet, the H.M.S. Ocean, up the Thames to a berth in London to serve as a base for the operation -- one that will involve more than 13,000 soldiers and marines in the largest domestic mobilization since World War II.

Personal Privacy on Facebook
05/10/2012

It is not news that Facebook, the behemoth of social networking, is less than aggressive about protecting the personal privacy of its 900 million users. But even relatively savvy users may not be aware of how much of their information is collected, how it is used and how little control they may have over it.

And with millions of workers now using social networking in their professional as well as personal lives, those privacy risks extend in a very big way to the enterprise.

Facebook used for Nightclub Security
05/09/2012

It is claimed to be a means to ensure underage party-goers are not able to enter the establishments, and as the majority of young people appear to own a social media account, nightclub security is also assuming that access to these accounts through mobile devices is possible.

The process was undertaken in order to match her driving license to her Facebook profile, verifying that identification cards belonged to the individual.

FTC Fines for Safari Breach
05/07/2012

The Federal Trade Commission is apparently ready to fine search engine giant Google millions of dollars for using an invasive advertising cookie on Apples Safari browser, according to Consumer Watchdog, who filed a complaint in February with the FTC after Stanford Researcher Jonathan Mayer, who identified the breach.

Bloomberg reported on Saturday that Google is in the process of negotiating with FTC about how big the fine could be. The report cited a person familiar with the matter, saying that the fine could amount to more than $10 million dollars.

Security Vulnerabilities
05/02/2012

Fewer security vulnerabilities have been reported on an annual basis since 2006, but that does not mean the threats are getting any less severe, according to Hewlett-Packard.

Published on Thursday, HPs 2011 Top Cyber Security Risks Report tackles what kinds of security threats are growing and the possible ramifications if/when they get out of control.

Although the disclosure of new vulnerabilities in commercial applications dropped by nearly 20 percent in 2011 from the previous year, nearly a quarter of all new vulnerabilities disclosed in commercial applications in 2011 were rated as quite severe.

SBA Security
05/01/2012

Small businesses around the country can take advantage of free computer security workshops to help strengthen their information security, determine their readiness against security breaches and safeguard their business information from computer attacks.

The U.S. Small Business Administration, Commerce Department's National Institute of Standards and Technology and the Federal Bureau of Investigations InfraGard will conduct a series of workshops on information security threats and solutions designed for small businesses.

This joint federal partnership promotes information security training and computer protection for the nations small business community and will help to identify information security vulnerabilities that can put small businesses at risk and the protective tools and techniques used to assess, maintain and guard their information and systems.

Security Firm Bankruptcy
04/30/2012

A company whose security guards patrol the White House filed for bankruptcy with an emergency request to transfer a series of its government contracts to a competitor, a move to ensure that President Barack Obamas home and other federal buildings do not go unwatched.

Airline Security Deal
04/29/2012

Two years after the formal expiration of a controversial Bush-era pact requiring air passenger data be handed over to the U.S. Department of Homeland Security, a deeply divided European Parliament approved a new agreement Thursday with tighter protections but just as many concerns over privacy.

In a vote of 409 in favor, 226 opposed and 33 abstentions, the European Unions governing body approved the Passenger Name Record agreement with the United States. Many who voted against the PNR pact contend that the new rules, like the ones they replace, violate civil liberties and privacy protections.



Current Blog

2012 Security Blog Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.