Tuesday, May 12, 2009

Implications of proposed Cybersecurity Act of 2009, Part 1

Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by CA, Inc.
rule

CA, Inc. Not More Security. Better Security.
CA Security Management streamlines your IT security environment without upsizing your infrastructure. Get your business more secure, agile and compliant. All with faster time to value.

rule

Spotlight Story
Implications of proposed Cybersecurity Act of 2009, Part 1

M. E. Kabay By M. E. Kabay
Legislators mean well, but their proposals for regulation of areas that depend on technical expertise always make my hackles rise - even before I've read the details. One of these cases is the occasion for today's and our next columns. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Inside a data leak audit
When the director of IT at a Boston-based, midsize pharmaceutical firm was first approached to participate in a data leakage audit, he was thrilled. He figured the audit would uncover a few weak spots in the company's data leak defenses and he would then be able to leverage the audit results into funding for additional security resources.

The feeling of greater security tempts us to be more reckless
The recent newsletter - rant, really - about the National Institute of Standards and Technology (NIST) white paper on enterprise password management ('Managing' passwords doesn't make them less unsafe) elicited a number of comments, some not very complimentary.

6 ways to protect your privacy on Google
Google provides many ways to protect your privacy online -- you just need to find them. Here are six good ones.

UC Berkeley says hacker broke into health-services databases
The University of California at Berkeley Friday disclosed that hackers broke into restricted computer databases in the campus health-services center, as the university began notifying current and former Berkeley students their personal information may have been taken.

Cyberbullying? No, it's just bullying.
Gibbs discusses proposed legislation concerning "cyber-bullying" and points out that the laws would be a really, really bad idea and that that conflating "cyber" with almost anything is simply bogus. Dude.

Govt agencies losing portable data: Privacy Commissioner
Many Australian government agencies do not have appropriate controls covering the use of portable storage devices (PSDs) for the handling of personal information.According to new research by the Office of the Privacy Commissioner, this personal information is being lost at an alarming rate.

U.S. gov't: 'Top obligation' is to U.S. workers
U.S. Department of Homeland Security Secretary Janet Napolitano told a congressional committee that ensuring American workers have jobs is a "top obligation," and that her agency was stepping up its enforcement of the H-1B program.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by CA, Inc.
rule

CA, Inc. Not More Security. Better Security.
CA Security Management streamlines your IT security environment without upsizing your infrastructure. Get your business more secure, agile and compliant. All with faster time to value.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

05/12/09

Today's most-read stories:

  1. Robot Fight Club
  2. The Internet sky really is falling
  3. Death of the mouse
  4. Bill would turn Internet flamers into felons
  5. Ubiquitous GPS coverage could soon get spotty
  6. Extreme, Force10 address growing 10G use in data centers
  7. Data center 10G whets switching companies' appetites
  8. Inside a data leak audit
  9. UC Berkeley says hacker broke into health-services databases
  10. Designing for high-density Wi-Fi coverage
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment