-
Cisco shows Cisco Open Platform for Safety and Security
New solution facilitates business continuity and force protection mission alike; in addition to incorporating Cisco’s own surveillance and network security technologies, new solution supports sensor integration and management, video analytics, geographic information system (GIS) framework for common operating picture, enterprise mass emergency notification, and physical access control
-
-
Microsoft joins MIT Kerberos Consortium
Kerberos develops the widely used network authentication standard; eight years ago Microsoft was accused of subverting the standard by adding proprietary extensions; after Microsoft lost both U.S. and European anti-trust trials, company joins consortium
-
-
Reported Internet crime losses increase by $40 million
In 2007, 206,884 U.S. citizens complained of being victims of Internet crime; 90,000 cases were referred to law enforcement; reported losses amounted to $240 million; most reported complaint: Fraudulent Internet auctions
-
-
U.S. Cyber Command to fight cybercrime
New Air Force command will be involved in fighting cyber crime which leads to information loss or possible physical attacks through denial of service
-
-
This weekend: 32nd annual computing Battle of the Brains
The 32nd annual collegiate programming contest will take place this weekend in Alberta, Canada; one hundred three-person teams from thirty-three countries have qualified; twenty of the teams represent U.S. colleges
-
-
Riding the Next Wave -- WiMAX versus LTE // by Peter Howard
By 2011, it is estimated that 1.5 billion people will have broadband; which technology will better serve their needs — WiMAX or LTE? WiMAX is already here, and LTE will take time to roll out — but when it does, it will give WiMAX a run for its money; LTE offers spectrum flexibility, significant added capacity, and a platform for delivering premium applications cost effectively
-
-
Private-sector support for telecommuting grows
Heightened concerns about traffic congestion, air pollution, and gasoline prices — and worries about business continuity — increase the attraction of telecommuting; new CDW report reveals that support for telecommuting grows, but is offset by security concerns
-
-
Preparing for the electromagnetic pulse (EMP) threat
One unexpected lesson of the many nuclear tests conducted by the superpowers in the late 1950s and early 1960s was that high-altitude nuclear blasts create far-reaching atmospheric effects that could instantly shut down power grids; as modern life becomes ever-more dependent on electronic gadgets, and as the proliferation of nuclear weapons and missiles continue, fear grows that an adversary will seek to cripple the United States by creating an atmospheric EMP effect
-
-
Rod Beckstrom to head NCSS
DHS taps Silicon Valley serial entrepreneur Rod Beckstrom to head new cyber security outfit; Beckstrom’s task is to secure the government IT systems
-
-
Debate over data security breach insurance continues
With more and more stories about data security breaches at major companies with millions of customers, the question arises: Should companies, as part of their business continuity plan, take out data security breach insurance? Industry insiders, analysts offer a range of opinions
-
-
VigilancePro from OpticVision
VigilancePro offers organizations protection from both internal and external threats; this endpoint security solution allows organizations to set their security and alert policies; it integrates with existing security systems; and it connects physical and digital security to fill the gaps in existing IT security infrastructures
-
-
TeleContinuity granted Type II carrier license in Japan
Japan is earthquake prone, so Japanese companies and organizations are especially interested in business continuity and disaster recovery solutions; one innovative communication continuity solution comes from TeleContinuity, and the prediction here is that the Type II carrier license, and a good distribution agreement with ECOSS Japan, would make the company’s products a success in the not-always-easy-to-penetrate Japanese market
-
-
Advanced software identifies complex cyber network attacks
By their very nature networks are highly interdependent and each machine’s overall susceptibility to attack depends on the vulnerabilities of the other machines in the network; new software allows IT managers to address this problem
-
-
More than 4 million credit, debit cards exposed in security breach
Supermarket chain Hannaford Bros., with 270 stores nationwide, says that a security breach in its system exposed 4.2 million credit and debit cards; 1,800 cases of fraudulent use already detected
-
-
Serious RFID vulnerability discovered
A group of a Dutch university’s digital security researchers discovers a major security flaw in a popular RFID tag; discovery can have serious commercial and national security implications; as important as the discovery itself was how the researchers handled the situation
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.