Thursday, April 30, 2009

New cybersecurity bill for electric grid readied; The Kilo-Day threat and mundane security

Lawmakers to introduce new legislation aimed at bolstering the industry's responsiveness to electric grid to cyberattacks
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Radware
rule

Radware Boost Your Immunity with New DefensePro!
New models of DefensePro offer on demand IPS scalability and behavioral protection up to more than 12Gbps for unmatched Data Center security performance and lowest TCO. Your Best Defense for a Healthy Network Just Got Better. Learn More.

rule

Spotlight Story
New cybersecurity bill for electric grid readied

By Jaikumar Vijayan
Amid growing concern over the vulnerability of the U.S. electric grid to cyberattacks, two lawmakers are preparing to introduce new legislation aimed at bolstering the industry's responsiveness to such threats. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

The Kilo-Day threat and mundane security In the security business we spend a lot of time worrying about the "zero-day" threat that appears out of nowhere and immediately starts attacking a hereto unknown vulnerability. We imagine genius hackers probing software to discover new and unique ways of attacking our systems.

Trend Micro acquiring Third Brigade in IT security deal Trend Micro Wednesday announced it’s acquiring Third Brigade, an Ottawa, Ontario provider of host-based intrusion-prevention and firewall software, for an undisclosed price.

'Hackers wanted' ad fed security misconception I should never be surprised at things related to government security efforts, but I did think the concept of hiring hackers was pretty much dead in government circles. Then comes the recent headline, " U.S. Looks to Hackers to Protect Cyber Networks." Frankly, I think it set the security profession back at least three years.

Study: IT Security Certifications Required by More Employers More companies are requiring IT security certification, according to research released recently by the Computing Technology Industry Association (CompTIA).

Where PCI DSS Still Falls Short and How to Improve It There's no doubt that the mere existence of a uniform policy -- adopted, recommended and even mandated by such firm rivals as American Express, Visa and MasterCard -- is a huge step forward.

PGP complaint forces ElcomSoft to change booth decor It isn't the best marketing proposition to sell encryption products next door to a fellow exhibitor who promises they can crack them.

10 Dos and Don'ts for Security Job Interviews The pickings are slim in the job market and the time line of interviewing and then hiring new people is slow. But there are positions available in the security field, according to three veteran security recruiters that we spoke with recently. If you're looking for a change in your career, or are simply looking to get back to work, there is simply no room for anything less than the best impression these days.

Security pushed to provide ROI Some security professionals argue that because their profession mitigates risk, it should be excluded from the need to return capital. Moreover, some make the case that project governance could be hijacked and reputation damaged if financial returns, based on an extrapolation of risk reduction, are not delivered.

Interop off to a good start Cisco Subnet blogger Larry Chaffins says that based on the number of vendors contacting him for meetings/briefings at Interop, this year's attendance should be pretty much on par with last's show.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Radware
rule

Radware Boost Your Immunity with New DefensePro!
New models of DefensePro offer on demand IPS scalability and behavioral protection up to more than 12Gbps for unmatched Data Center security performance and lowest TCO. Your Best Defense for a Healthy Network Just Got Better. Learn More.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/30/09

Today's most-read stories:

  1. Swine flu threat raises telework questions
  2. Microsoft targets Windows, Linux management
  3. It takes a village idiot: The jerks of online forums
  4. Seven burning security questions
  5. Oracle, Sun deal brings back the glory days of FUD
  6. Military enlists open source community
  7. More ways to manage IP addresses
  8. 57 amazing things you didn't know your tech could do!
  9. The first 10 rules of Twittiquette
  10. BizTalk Server 2009 ready for the public
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment