The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
The best place to start is with what "The State of Information Security 2003" survey doesn't include. It doesn't include some stark bit of data that will make you slap your forehead and exclaim, "Oh, that's the problem!" It doesn't include figures that suggest a secret formula for setting a security budget.. . .
Where does the security buck stop? All of the certifications and training in the world won't make any difference to the security of corporate networks if senior managers and top executives don't understand the problems and requirements faced by security professionals, a consultant and former CIO said in a Wednesday keynote speech here at the Security Decisions 2003 conference.. . .
Evans Data Corporation's Fall 2003 North American Development Survey has found that Linux has increased its lead in developers' minds as the "most innately secure operating system" from 19% six months ago to 23% today. . . .
What legal regimes or market initiatives would best prevent the unauthorized disclosure of private information while also promoting business innovation? As individuals do more - shopping, talking, working - on-line, they leave private information behind in databases stored on Internet-connected . . .
Are network intrusion detection systems (NIDS) still relevant? With the emphasis shifting to network intrusion protection in the last two years, this technology looks like it is on its last legs. But is it? Related to intrusion detection and protection . . .
As CEOs turn to security professionals to protect the enterprise, it's about time some security professionals became top executives themselves. Security is finally becoming a primary IT job function. But does it mean that security professionals will be granted their own role in executive management?. . .
Von Spangler submits Currently the Info-Sec Writers Guild - a non-profit organization (http://www.infosecwriters.com/cgi-sys/suspendedpage.cgi) - has security/hacking books and training kits that they're giving away as prizes for the "Best Security Papers" of the month contest. Basically anyone who submits . . .
The ability to enhance security in information systems and networks is limited by the operating systems that underpin them. Recognizing this, the Institute of Electrical and Electronics Engineers (IEEE) has begun work on a standard to formulate consistent baseline security requirements for general-purpose (GP), commercial, off-the-shelf (COTS) operating systems.. . .
The Computer Emergency Response Team (CERT) Coordination Center, a security-incident clearinghouse, introduced on Monday a program to certify information technology professionals in incident handling and response.. . .
Matthew G. Marsh submitsThe Fifth Annual CERT Conference on Computer Security and Information Assurance will be held August 5-7, 2003. The online registration site is now open. Early bird registration closes July 10th. . .
This conference is designed by and for those responsible for Information Assurance programs in the public sector. The three-day agenda includes sessions on planning, managing, and funding IA initiatives throughout government enterprises. September 15 - 17, 2003 . . .
If not center stage, Linux and Open Source software certainly occupy a credible place within the upcoming CeBIT America 2003 conference and exhibition taking place at New York City's Jacob K. Javits Convention Center, reflecting the growing acceptance and use of . . .
In the quest for an ironclad information-security program, organizations typically take a textbook approach: First, a business-impact analysis and asset-assessment study identify critical data needing protection and the servers where that data resides. Then, security policies are developed from these studies, your business plan and organizational goals.. . .
Everybody has a plan to end spam these days. But the work the Anti-Spam Research Group is doing is different. The ASRG has the prestige to get its proposals put in place. The group is affiliated with the Internet Engineering Task Force (IETF), which sets the standards for the fundamental technologies that make the Internet possible.. . .
Leaders of several major open-source projects have joined George Washington University's Cyber Security Policy and Research Institute to push for greater government use of the Linux operating system.. . .
Following the success of last year's event, organization has begun for the HiverCon 2003 Corporate Security Conference. To be held in Dublin on November 6th-7th the venue is the Jurys Ballsbridge Hotel set in the heart of the city center. . .
Patrick Gray submits The Australian Federal Police are taking firm steps toward forging closer ties with the underground hacking community as evidenced at a recent security conference. Ruxcon, a conference organised by and for the Australian computer security community . . .
A group of application security vendors affiliated with the Organization for the Advancement of Structured Information Standards (OASIS) will next week announce a proposal for an XML standard for application vulnerabilities. The announcement will be made at the RSA Conference being held in San Francisco.. . .
The OpenBSD project hopes new changes to its latest release will eliminate "buffer overflows," a software issue that has been plaguing security experts for more than three decades.. . .
Mike Jackson, Linux Shadow Password HOWTO (LSPH) author, passed away on Friday, March 28th at the young age of 38. The Linux community has lost a great friend and advocate. In addition to maintaining the LSPH all these years Mike was . . .