Blog Postings

June 4,2013

0:06
Can the open-source, Linux-based Firefox mobile operating system become a mobile-space player? The question is far from answered but Mozilla has a new supporter: major electronics contract manufacturer Foxconn.
Categories: All , Technical

June 3,2013

23:55
Don't want to get locked into Apple's ecosystem by buying an iPad or iPad mini? No problem! Here are my top 7 Android tablets for July 2013. And if you're looking for budget Android tablets, there's two here you might be interested in.
Categories: All , Technical
23:36
Big Blue has filed a bid to protest the $600 million, 10-year cloud contract awarded to Amazon by the U.S. Central Intelligence Agency.
Categories: All , Technical
23:33
With the newly announced Windows Azure Pack, Microsoft may have found a way to deliver its long-promised private cloud in a box.
Categories: All , Technical
22:44
Google is getting more serious about supporting the development of mobile apps on its App Engine cloud platform.
Categories: All , Technical
22:42
The intended merger of Drobo, of almost management-free storage fame, and Connected Data, the brand-new maker of an innovative backup appliance, is good news for weary storage users.
Categories: All , Technical
22:34
Time to take a tour of a handful of the best Android smartphones currently available on the market (June 2013). Here are some killer handsets from Google, HTC, Motorola, and Samsung.
Categories: All , Technical
22:04
UPDATED: Zynga confirms cutting its global workforce by 18 percent as it restructures with a focus on mobile channels.
Categories: All , Technical
21:46
View more Government_Industries news and analysis from Computerworld.com
Categories:
21:36
Increased demand for AMOLED smartphone panels, partly caused by increasing screen size, will put pressure of manufacturing plants to keep up with supply. This make the industry vulnerable to any supply chain kinks.
Categories: All , Technical
21:18
The Transformer Book Trio stuffs two OSes, two batteries, and two completely different processors inside its latest hybrid. It seems to be a whole new category of mobile device, but it's actually been done before.
Categories: All , Technical
20:57
There has been a lot of speculation about a Verizon version of the HTC One and today Verizon confirmed it is indeed coming and may even be branded as an HTC One.
Categories: All , Technical
20:56
At its Computex press conference Acer announced what it said is the industry’s first 8-inch Windows 8 tablet, its first "phablet," and updates to its Aspire S3 and S7 laptops—all equipped with touchscreens.
Categories: All , Technical
20:46
Sprint is pulling all of its cards out to block any chance Dish might have in the Clearwire bidding drama.
Categories: All , Technical
20:45
Gartner's Litan on Why Banks Must Review Controls, Processes
How could global fraudsters steal $45 million from banking institutions without being detected or stopped? It was a process breakdown, not a technology failure, says fraud expert Avivah Litan of Gartner.
Categories: Technical , All
20:45
The Department of Defense and two other government agencies have issued a proposed rule designed to help ensure that government contractors provide adequate privacy training to their staff members.
Categories: Technical , All
20:45
Guidance on establishing processes to rapidly detect and respond to cyber incidents.
Categories: Technical , All
20:45

From sophisticated new forms of malware to the nation-state and the advanced persistent threat (APT), cybersecurity incidents have evolved at a rapid pace and are disrupting organizations and damaging reputations. But are organizations' incident response programs, personnel and tools evolving to keep up with the new threat landscape?

According to the 2013 Incident Response Survey results, only 20% of organizations rate their incident response programs as "very effective." Their biggest gaps: Being able to detect and contain malware, which can also be the precursor to advanced persistent threats.

Aimed at determining how organizations are prepared to respond to today's new breed of cyber-attacks, the survey also finds many respondents experienced malicious code in the past year, had lost or stolen devices, or were victims of spear phishing, resulting in system downtime, lost or compromised data or financial loss. Only 26 percent of respondents rate their current anti-malware tools as "very effective."

In this session, thought-leaders from FireEye and ISMG will present and analyze responses to key questions, including:

  • How are organizations prepared to respond to advanced persistent threats?
  • What are the technical challenges that impact the ability for effective incident response?
  • How can organizations evolve their incident response plans to address the new threat landscape?
Categories: Technical , All
20:45
Specifying architecture and technical requirements for a common identification standard for federal employees and contractors.
Categories: Technical , All
20:45
Move Comes One Year After Massive Breach
A year after LinkedIn confirmed its network had been breached, reportedly exposing 6.5 million hashed passwords, the social media company is offering users the option of adopting two-factor authentication.
Categories: Technical , All
20:45
Incidents, Real and Threatened, Provide Collaboration Lessons
A result of recent DDoS attacks targeting American banks and the lackluster OpUSA campaign against the federal government has been improved sharing of threat information, former DHS cybersecurity leader Mark Weatherford says.
Categories: Technical , All
20:45
Organization, Mission and Information System View
Categories: Technical , All
20:45
Governor Taps Office of Information Security Veteran to Head Unit
Michele Robinson is leading efforts with the private sector to improve cybersecurity throughout the state as well as increase IT security know-how among state agencies' information security officers.
Categories: Technical , All
20:45

Trends in fraud management have evolved as more business has moved online, where the applicant can easily hide under a stolen or made-up identity. Now it's time to move beyond chasing after the fact to preventing fraud before it happens.

Equifax has extensive experience working in the financial sector and with major government agencies to help identify fraudulent applicants before they get in the front door. Working across verticals means that lessons from each are combined to create a complete view of fraud behavior and best practices for combating it.

In this session, Ryan Fox, Principal in Equifax Identity and Fraud Solutions consulting group, will review implementations across federal agencies built from analytic models that serve to successfully prevent fraud in the financial, e-retail and telecommunications space. These sophisticated analytics assess the likelihood of fraud through extensive matching within proprietary data sources, and assessment of network activity associated with that identity.

He'll be joined by Rich Huffman, Senior Product Manager for Fraud, discussing best practices in fraud mitigation that result in a tiered process. Among the core elements to be discussed:

  • Focus on prevention measures, including identity proofing that uses a broad range of data elements to verify the applicant's identity;
  • Gauge the risk profile of the device used to interact with the institution;
  • Review information within a channel, across channels and between internal and external sources;
  • Reduce portal abandonment rate by limiting intrusive procedures to high-risk applicants;
  • Comply with appropriate regulations and industry guidelines;
  • Minimize manual processing time and costs.
Categories: Technical , All
20:45

DDoS was thought to be a threat from the past until it was reactivated and re-energized by the hacktivist group known as the Izz ad-Din al-Qassam Cyber Fighters.

Since the fall of 2012, the attackers have used DDoS to disrupt the online functions of nearly 50 U.S. financial institutions, causing website outages that alarmed customers and caused two federal regulatory agencies to issue fraud alerts to member institutions.

Following the two initial waves of attacks, in the fall and winter of 2012, the hacktivists took time off to regroup. Each time they came back stronger.

But the third wave, which commenced in March 2013, shows no sign of abating. Not only have the attacks morphed, targeting different vulnerabilities, but the attackers' botnet has strengthened. In April, the FBI warned that attack scripts have been modified in an attempt to increase the effectiveness with which the scripts evade detection. The actors are changing their attack methodology, the FBI says, to circumvent mitigation efforts of the financial institutions.

Concurrently, electrical utilities, gaming sites and European banking institutions all have experienced different forms of DDoS.

How can organizations from across industry defend themselves against attacks that some of the world's largest banks cannot prevent?

That is the key question that will be answered in this panel discussion from three unique perspectives:

  • The Bank - Michael Wyffels, SVP and CTO of QCR Holdings Inc., a multibank holding company, will discuss how his institutions assess and respond to DDoS risks, as well as what DDoS means to the banks and their customers.
  • The Journalist - Tracy Kitten, Executive Editor of BankInfoSecurity and CUInfoSecurity, will share insight she's gleaned from covering the DDoS story exhaustively since it first broke.
  • The Expert - Rodney Joffe, SVP & Senior Technologist, Neustar, is one of the foremost industry experts on DDoS and can explain exactly what the latest attack trends show us, and how you can make your organization a less desirable DDoS target.
Categories: Technical , All
20:45

Mobility has brought privacy to the forefront. Increasingly, organizations are providing new services and conducting new business on mobile devices. And regulators such as the Federal Trade Commission have offered new guidelines specific to ensuring privacy protections for the users of mobile devices.

This enhanced focus on privacy forces security leaders to answer fundamental questions:

  • How does the organization currently use, store and protect personal information to prevent a data breach?
  • And should a breach occur, how would the organization respond and ensure the ongoing protection of this information?

These are privacy questions that increasingly play a role in organizations' breach prevention and response strategies. And to be effective, security leaders better know the answers - from a privacy officer's unique perspective.

At McAfee, Chief Privacy Officer Michelle Dennedy understands the necessity of taking proactive steps to protect privacy and to work with security to minimize the risk and impact of a data breach.

In this webinar, Dennedy leads an important discussion about the fundamental differences in the roles played by privacy and information security professionals, as well as their mutual understanding of data security. She also discusses the key elements of implementing a unified privacy policy, and effective actions a security officer can take to improve privacy practices within the organization. Dennedy also discusses:

  • Fostering Privacy: by initiating a cultural transformation within organizations on how employees treat and store data;
  • Collaboration of Privacy and Security: in building the right team, establishing accountabilities and initiating in-depth privacy awareness programs;
  • Breach Response: by understanding the top privacy risks, breach impact, legislative rules and actions to be taken in the event of a breach.
Categories: Technical , All
20:45
Attacks aimed at mobile devices are progressing much more rapidly than any attacks ever waged against PCs. Organizations are in danger if they don't pay attention, says anti-phishing expert Dave Jevans.
Categories: Technical , All
20:45
Privacy attorney Ron Raether challenges a commission's recent recommendation that the government should support companies that use the hack-back approach to mitigating the theft of intellectual property.
Categories: Technical , All
20:45
If everyone supports the idea of sharing cyberthreat information, then why is information sharing so difficult? Shawn Henry, a former investigator with the FBI, tells how organizations can clear their biggest hurdles.
Categories: Technical , All
20:45
Facing advanced cyber-attacks, organizations must shift their focus to detection and mitigation, says ISACA's Jeff Spivey, who outlines four capabilities necessary for effective response.
Categories: Technical , All

Tagcloud