Items Tagged with "Policy"


69dafe8b58066478aea48f3d0f384820

International Coalition Issues Cybersecurity Policy Principles

June 26, 2012

"Policymakers are keenly focused on the development of smart, effective, robust cyber defenses... The tech sector wants to ensure that the digital world’s foundation of openness and collaboration is not lost to a well-intentioned but poorly constructed international patchwork of cyber defenses"...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

On NATO and Cyber Warfare

June 20, 2012 Added by:gaToMaLo r. amores

"Threats are rapidly evolving both in frequency and sophistication. Threats emanating from cyberspace – whether from states, hacktivists or criminal organizations, among many others – pose a considerable challenge to the Alliance and must be dealt with as a matter of urgency"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO Sponsored CyCon Tackles Cyber Security Issues

June 13, 2012 Added by:Headlines

Attribution is hard because of the nature of attacks, which tend to have several stages and the whole attack is spread over a long period of time. It is of no help either that the Internet is governed by multiple jurisdictions so international cooperation is necessary but often lacking...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Hooray! An Open-Source Password Analyzer Tool...

June 08, 2012 Added by:Brent Huston

The time it takes to crack a password is the only true measure of its worth. Morris has created a tool for administrators that allows them to configure a password policy based on the time to crack, the possible technology that an attacker might be using, and the password protection technology in use...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cybersecurity: Washington DC is a World of Grey

June 07, 2012 Added by:Joel Harding

The US State Department cannot sign many treaties in cyberspace, and we cannot establish a lot of cooperation, because there is a lack of a definition or there is no established threshold for most of what we deal with. Part of that problem is that as soon as the ink dries, most of the conditions will change...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Senator Demands Text of Secret Agreements Regulating Internet

May 30, 2012 Added by:Electronic Frontier Foundation

Senator Ron Wyden recently introduced a bill demanding access to draft texts of international trade agreements under negotiation such as the Trans-Pacific Partnership Agreement that carry provisions that could severely choke off users' rights on the Internet. This is a great positive step in the right direction...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO and Cyber Defense

May 24, 2012 Added by:Headlines

In February 2012, a 58 million Euro contract was awarded to establish a NATO Cyber Incident Response Capability (NCIRC), to be fully operational by the end of 2012. A Cyber Threat Awareness Cell is also being set up to enhance intelligence sharing and situational awareness...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cloud Patch Management: Consistency and Automation

May 23, 2012 Added by:Rafal Los

If you've chosen wisely, you environments across your public and private clouds are consistent. The big question is - how do we keep our environments consistent in the face of security requirements to push patches? The answers rely very heavily on automation and policy...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

CISO 2.0: Enterprise Umpire or Wide Receiver?

May 21, 2012 Added by:Robb Reck

In security, our challenge to demonstrate to the business that the money they invest in us goes further than just keeping us out of the newspaper. Security can deliver tangible benefits out to the business. An effective security program can reduce the costs of creating products...

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

Twitter Commits to Respecting Do Not Track with New Policy

May 21, 2012 Added by:Electronic Frontier Foundation

This doesn’t mean Twitter will stop collecting all data on you. They’ll still be able to collect aggregate data about your browsing habits for analytics and security, but they won’t set a cookie and they won’t use data to suggest users to you or for tailoring your Twitter experience...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

SCADA Security: Consequences and Difficulty with Incentives

May 18, 2012 Added by:Rafal Los

Here's the problem - when it comes to critical infrastructure protection it's very difficult to legislate and regulate the organizations that matter into a state of better security. The problem is that in order to enforce policy and rules there either have to be consequences to failing, or incentives not to fail - or both...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Have You Read the New Facebook Privacy Rules… Again??

May 18, 2012 Added by:Theresa Payton

They know your location, and they confirm what they grab whenever you connect to Facebook: “We receive data from the computer, mobile phone or other device you use to access Facebook. This may include your IP address, location, the type of browser you use, or the pages you visit”...

Comments  (2)

2e541940bc9b12ea62726bb51ed8787d

BYOD - It's a Personal Matter

May 16, 2012 Added by:Phil Klassen

When you own something, especially a mobile device, there is a sense of entitlement that the individual has. So it's critical that you establish the fact that using a personal device to do company business is a privilege, not a right, and that privilege can be taken away...

Comments  (1)

959779642e6e758563e80b5d83150a9f

Treat Passwords Like Cash

May 14, 2012 Added by:Danny Lieberman

Every Web site and business application has a different algorithm and password policy. For users, who need to maintain strong passwords using 25 different policies on 25 different systems sites, it’s impossible to maintain a strong password policy without making some compromises...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Taming the WWW or Wild Wild West

May 13, 2012 Added by:Jayson Wylie

There is a reason the security world refers to exploitation on the Internet to activity ‘in the wild’. A comparison can be made to the lawless, tough and unforgiving world of the Wild West in American history. You can get your stuffz or scalp taken...

Comments  (0)

2e541940bc9b12ea62726bb51ed8787d

BYOD is really BYOPMD

May 07, 2012 Added by:Phil Klassen

BYOD should make the security society very nervous. For those who still believe that personal devices will never be a part of your network, remember, never say never. Regardless if non-corporate devices have accessed your network or not, the first step is acceptable use policy...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »