-
Corporate e-mail authentication battle royal: IP-based vs. signature-based
There are two categorical approaches to corporate e-mail security: Path- or IP-based focuses on where the message originated and evaluates the network path traversed by the e-mail; cryptographic methods look at who sent the message
-
-
TI licenses Elliptic Curve Cryptography (ECC) technology
TI prepares for the future: Company notices two trends — growing shift toward e-documents, and increasing need for NIST-based security protocols compliance; TI licenses Certicom ECC technology
-
-
Chinese subcontractor installs trojan horses on hard drives
Seagate hard drives sold in Taiwan are discovered to have trojan horses installed on them by Chinese subcontractor; virus uploads information saved on the computer automatically to Web sites in Beijing
-
-
Sender ID vs encryption, I
Fighting spam requires authenticating e-mail addresses on the fly; Microsoft-backed Sender ID battles with encryption-based schemes for adoption by enterprises
-
-
Blue-ribbon panel to recommend cybersecurity measure to next president
CSIS creates a 31-member committee of experts and policy makers to recommend comprehensive cybersecurity measures to the next president
-
-
IBM will spend $1.5 billion to improve computer security
IBM’s security initiative would double IBM’s security spending; company says its IT security is becoming more difficult because of collaborative business models, sophisticated criminal attacks, and increasingly complex infrastructures
-
-
Rumors of al Qaeda cyber attack to be launched 11 November
News report says that Bin Laden’s cyber legions are retaliating against Western surveillance programs; among the targets: Western, Jewish, Israeli, Muslim apostate, and Shiite Web sites
-
-
NIST invites comments on important FISMA-related document
NIST releases cybersecurity framework document for public comment; when finalized, it will become NIST’s flagship FISMA-related document
-
-
Colorado Springs lobbying for AF Cyber Command to move there
Colorado, California, Nebraska, and Louisiana compete for being home to the Air Force’s new Cyber Command
-
-
Annual report gives so-so grades to IT security on college campuses
CDW Government released the results of its third annual report card on campus IT security; the grades are mostly Cs — gentleman’s Cs at that
-
-
SMBs ill-prepared to thwart cybercrime
Small and medium-size businesses account for a large portion of the economies of advanced countries, but a recent Webroot report says SMBs have minimal IT staffs and do not apprciate the risks
-
-
New, detailed study of identity theft
An academic center for identity management issues a study which benefits from the U.S. Secret Service allowing, for the first time, review of its closed case files on identity theft and fraud
-
-
U.S. Air Force moves forward cyber warfare
Fly and fight in cyberspace: U.S. Air Force aims to achieve “global decision superiority” by integrating warfighting command and control systems
-
-
Following contractor's loss of laptops, TSA now requires encryption
Contractors for TSA must now encrypt all data on their computers; order issued after loss of laptops holding information on nearly 4,000 hazmat drivers
-
-
New, bipartisan identity theft and cyber crime bill proposed
As cyber crime and identity theft increase, two veteran legislators, who have collaborated in the past on data privace issues, propose tough new measures to counter cyber malfeasance
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.