Search This Blog

Thursday, January 29, 2009

Information security and the outsider, Part 2

Civil Air Patrol as a case study in security for outsiders
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Spotlight Story
Information security and the outsider, Part 2

M. E. Kabay By M. E. Kabay
Lt. Col. Robert E. Jennings is back with a look at how Civil Air Patrol, the all-volunteer, civilian auxiliary of the U.S. Air Force, introduced more rigorous information security practices to better serve new domestic missions from the government. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Information security and the outsider, Part 1 In a world of new, unconventional military conflict around the globe, one of the largest producers of secure information, the U.S. government, has had to create non-traditional partnerships to help accomplish domestic missions. In this two-part series, guest writer Lt. Col. Robert E. Jennings, vice commander of the New Jersey Wing of the Civil Air Patrol and a leader of the service delivery managers in Dell's ProSupport organization, looks at how the government is working with semi-official volunteer organizations. In part 2, he provides a case study of how one of those organizations adapted to provide better information security for their new assignments.

Searching for the digital needle in a relational hackstack Let me share a few of the tools I use to help customers identify their possible exposure to information theft.

17 High-Risk Security Threats (And How to Fix Them) Network worms. Phishing e-mail. Drive-by downloads. Data sniffed from an open wireless network. To use a computer safely in the 21st century, you have to be prepared to combat a growing number of constantly evolving security threats.
Plus:
17 High-Risk Security Threats (And How to Fix Them)
How to Stop Operating-System Attacks
How to Lock Down the Data in Your Apps
How to Safeguard Your Online Security
How to Beat Card Skimmer Scams, Other Money Drains
How to Plug Security Holes in Your Browser
How to Keep Your Cell Phone Info Private
How to Protect Your Online Passwords

Stop data leaks Yes, you can keep sensitive data from leaving your organization. Our revamped Product Guide tells you what you need to know, including 5 questions to ask data-leak protection vendors before buying.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

HP Logical Servers
Make your datacenter infrastructure more adaptive with logical server technology. Find out how you can simplify routine tasks and create more efficiency within your datacenter.
Learn more


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/29/09

Today's most-read stories:

  1. Online privacy tips for teens . . . and the adults who ignore them
  2. FTC slaps Do Not Call violators with $1.2 million in penalties
  3. Fallout 3: Operation Anchorage DLC now available
  4. Cisco sets data center blast
  5. HP readies for Cisco's data center assault
  6. New Data Center: storage
  7. Cisco delivers security, storage, UC for small business
  8. Downadup/Conflicker worm: When will the next shoe fall?
  9. Cisco acquires building systems specialist
  10. New botnet resurrects Storm's Valentine's Day ruse


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: