NIST SP800-53 Rev. 3: Key to Unified Security Across Federal Government and Private Sectors Standards play a critical role in information assurance. Given the impossibility of defining a deterministic model that includes billions of users, millions of computers, and thousands of programs and protocols potentially interacting with each other unpredictably, we have to rely on human consensus about best practices if we are to progress in our field. Standards also provide a basis for demonstrating due care and diligence in fulfilling our fiduciary responsibilities to stakeholders. Week in Security: Windows 7 a go; Steve Ballmer a pro; ChoicePoint, MoneyGram face woe A look back at all things security for the past week: Trend Micro bolsters virtualization security options Trend Micro's Deep Security firewall/intrusion-protection system software for VMware's ESX server can protect multiple virtual machines on one physical server. IT industry graveyard 2009 Paying respects to Nortel as we knew it, Circuit City and more Data masking secures sensitive data in non-production environments Sensitive data is a part of every large organization's normal business practice. Allowing sensitive data from production applications to be copied and used for development and testing environments increases the potential for theft, loss or exposure -- thus increasing the organization's risk. Data masking is emerging as a best practice for obfuscating real data so it can be safely used in non-production environments. This helps organizations meet compliance requirements for PCI, HIPAA, GLBA and other data privacy regulations. NASA's future: Now the battle begins When it comes down to it, NASA is the most accomplished space organization in the world but its human spaceflight activities are at a tipping point, primarily due to a mismatch of goals and money. DHS to get big boost in cybersecurity spending in 2010 The U.S. Department of Homeland Security will likely have a substantially bigger cybersecurity budget for fiscal 2010 compared to this year. Anonymity of users is key issue in cyber crime: Kaspersky The relative anonymity of Internet users is the key issue in managing cyber crime, according Eugene Kaspersky, founder of Russian security firm Kaspersky. Analysis: Real ID program on life support A decision by lawmakers in Congress to slash funding for the unpopular Real ID national driver's license program has put an already struggling program on life support. Study: US gov't cybersecurity spending to grow significantly U.S. government spending on cybersecurity will grow at a compound rate of 8.1 percent a year between 2009 and 2014, outpacing general IT spending, according to the government analyst firm Input. Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment