Podcast: Security Trends for 2009 The true nature of the cloud, the quagmire of data leak prevention and virtual machine blind spots are some of the security issues that IT managers will face in 2009. Sophos CTO Richard Jacobs talks with Keith Shaw about the big picture for security in the upcoming year. (16:13) Cornell a LIIder in cyberlaw resources In the last column, I suggested that information assurance (IA) professionals need to keep abreast of legal developments and provided a list of resources for self-study of cyberlaw. Today I am pointing readers to the single most valuable research tool anyone can find in following developments in law that affect IA (or any kind of law). Pay attention to cyberlaw Not being a lawyer does not absolve us from knowing about basics of the law in the jurisdictions where we work. At a minimum, IA professionals need to be familiar with elements of criminal law such as definitions of cybercrimes, proper procedures for collaborating effectively with law enforcement officials, methods of collecting and preserving data as evidence that can successfully be used in criminal trials, and intellectual property law. Visible Ops Security, Phase 4 In the last four columns, I have been pointing out some of the excellent recommendations from the booklet called "Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps," by Gene Kim, Paul Love and George Spafford. Today I'm reviewing their chapter entitled, "Phase 4: Continual Improvement." But first, a little historical digression. Visible Ops Security, Phase 3 In the last three columns, I have been highlighting the excellent booklet called "Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps," by Gene Kim, Paul Love and George Spafford. Today I'm reviewing their chapter entitled, "Phase 3: Implement Development and Release Controls." Visible Ops Security, Phase 2 In the last two columns, I introduced the excellent booklet called Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps, by Gene Kim, Paul Love and George Spafford. Today I'm reviewing their chapter entitled, "Phase 2: Find Business Risks and Fix Fragile Artifacts." Visible Ops Security, Phase 1 In my last column, I introduced the excellent booklet called "Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps," by Gene Kim, Paul Love and George Spafford. Phase 1 provides a chilling reminder of how badly information assurance implementation can go wrong. Introducing Visible Ops Security In my last column, I wrote about the Visible Ops Handbook, which I recommend to everyone involved in system and network operations. Today I continue on the same theme by starting a review of the newer booklet, "Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps," by Gene Kim, Paul Love and George Spafford. Visible Ops Handbook Today I am reviewing a well-known handbook that applies ITIL principles to system and network operations. 'Visible Ops Handbook: Starting ITIL in 4 Practical Steps' by Kevin Behr, Gene Kim and George Spafford (2004) and published by the IT Process Institute, is a superb little booklet available online for $20; a PDF version is also available for download. We use this booklet in the Master of Science in Information Assurance (MSIA) program at Norwich University. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment