Worm floats Obama's head on your desktop The odds are pretty good that this will never happen to you, but should a floating head of U.S. President Barack Obama pop up on your desktop Monday morning, know this: You've been hit with the Obama worm. With economic slump, concerns rise over data theft Is the worsening economic situation going to turn some employees into data thieves? Related podcasts: 5 Ways Employees Can Sabotage Your Network Protecting against insider threats in a down economy Who's Stealing Your Data? Data export leaves firms vulnerable, says research The tendency of firms to distribute sensitive data to offices around the globe could be creating a new form of information vulnerability, a report has suggested. What New Air Cargo Security Rules Mean for Business February will mark the start of new guidelines for air cargo. A congressional mandate issued in 2007 requires the Transportation Security Administration to screen 50% of all cargo on board passenger aircraft. The mandate goes further to require 100% inspection by August 2010. Third U.S. gov't worker pleads to passport snooping A third U.S. State Department employee has pleaded guilty to illegally accessing dozens of confidential passport application files, the U.S. Department of Justice said. Information security and the outsider, Part 1 In a world of new, unconventional military conflict around the globe, one of the largest producers of secure information, the U.S. government, has had to create non-traditional partnerships to help accomplish domestic missions. In this two-part series, guest writer Lt. Col. Robert E. Jennings, vice commander of the New Jersey Wing of the Civil Air Patrol and a leader of the service delivery managers in Dell's ProSupport organization, looks at how the government is working with semi-official volunteer organizations. In part 2, he provides a case study of how one of those organizations adapted to provide better information security for their new assignments. Information security and the outsider, Part 2 Lt. Col. Robert E. Jennings is back with a look at how Civil Air Patrol, the all-volunteer, civilian auxiliary of the U.S. Air Force, introduced more rigorous information security practices to better serve new domestic missions from the government. Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment