| Spotlight Story | | | Implications of proposed Cybersecurity Act of 2009, Part 2 By M. E. Kabay Garamella: An effective attack could disrupt or disable elements such as public utilities, including power, water and gas. Ground and air traffic control systems are also potential targets. These critical elements warrant no less protection than defense, finance and healthcare. There is a proliferation of data breaches from all sectors of the cyber infrastructure. Left alone, this situation will only get worse. Read full story M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online. | | | Related News: | | | Cloud security demands greater scrutiny than traditional IT outsourcing The security gaps in cloud computing demand greater scrutiny than traditional IT outsourcing models, a new Forrester report says. With traditional outsourcing models, a customer places its own servers in someone else's data center, or a service provider manages devices dedicated to that customer. But multi-tenancy rules the day in cloud computing, and customers may not know where their data is stored or how it's replicated, Forrester analyst Chenxi Wang writes in a report titled "How secure is your cloud?" Microsoft "Geneva" could be genius but skeptics abound Microsoft Subnet recently met with Brendan Foley, director of product management at Identity & Security Business Group, and asked him a few questions about Microsoft's Geneva. The regional, cultural and national differences of identity management Identity management theory is pretty much the same the whole world over, the differences lie in the practice, or implementation. Last week's European Identity Conference was, as always, a wonderful look at not only European advances in identity management, but what's happening worldwide. | | EMA: Refining privilege access security. Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication. Click to download. DNS news and tips DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet. Receive the latest DNS news and tips |
No comments:
Post a Comment