Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

U.S., India to cooperate on tech security

Posted on October 13, 2004December 30, 2021 by admini

The two countries reached the agreement at the end of a two-day conference Wednesday of the main information technology industry organizations of India and the United States.

“The United States is willing to begin cooperation with appropriate government entities, including in India,” said Michele Markoff, the senior coordinator for international critical infrastructure protection in the U.S. State Department.

Markoff said that only a few months ago, the United States set up a 24-hour, seven-day-a-week monitoring system to watch for hacking or destructive computer and software viruses. But she said monitoring is more effective if done across the globe, with every nation setting up a system to protect its own data and networks and quickly sharing information on attacks.

Just how it would work will be discussed in November when the Information Technology Association of America hosts its Indian counterpart, the National Association of Software and Service Companies, or NASSCOM, the two groups that met in New Delhi this week. While governments are concerned about protecting networks against attacks by terrorist hackers, industry leaders also want to tackle data theft by employees or commercial hackers, computer viruses and unwanted e-mail — or “spam” — that hurts productivity.

http://www.siliconvalley.com/mld/siliconvalley/news/editorial/9909428.htm

Read more

Which Security Assessment Provider?

Posted on October 13, 2004December 30, 2021 by admini

Whether the Security Assessment is driven by an audit requirement, due-diligence or a compelling event, it is highly likely that there will be a requirement for a third party to conduct the work. Furthermore, the findings and advice identified as a result of the work may need to satisfy internal or external auditors, the board or shareholders. As such, it is clearly important that the style and content of the assessment, those performing the work and the deliverables (i.e. the reports) satisfy the technical requirements set down.

Perhaps more importantly, they must also reflect a business understanding within the context of the project, and be able to present and articulate this to technical and non-technical target audiences.

Business demand has grown alongside the proliferation of information regarding vulnerabilities, their exploitation and remediation. Corporate Internet presence has developed from simple, static brochure sites to increasingly complex interactive applications allowing potential customers and partners alike to delve into the data and systems at the heart of the enterprise.

The requirement may be for a security health check of the underlying infrastructure, comprising vulnerability identification and analysis within the publicly available shrink-wrapped devices and software. This could be a full proprietary web-enabled application allowing users to initiate transactions, accessing and modifying back-end data, for example Internet Banking. It may also be a small collection of scripts handling customer contact or queries, or the configuration of a document presentation and content management application. For example, the site could be enabled for mobile access, wireless technology may be deployed, integrated Voice and Data systems; all presenting new security risks.

It’s important to keep sight of what we are trying to achieve and protect through the assessment – generally the objective is to safeguard the core intellectual and electronic assets of the organisation, and to ensure compliance with regional and global, IT and data safeguard laws such as the UK DPA, US HIPAA, ISO17799 etc.

The Security Assessment industry has grown rapidly, and clients are now presented with a bewildering array of vendors offering services. Unfortunately, the development of practical and appropriate standards and accreditations has lagged behind. Because of this it is imperative to consider whether the prevailing standards are suitable or appropriate for your requirements.

Look for
– Methodologies: Compliance with formal methodologies helps ensure that an assessment is both repeatable and of a consistent standard.
– Certifications: Organisational and individual certifications are also useful in gauging whether a supplier is qualified to satisfy the testing requirements. As although some certification schemes apply to the organisation as a whole, they are typically focussed on the individual team members.
– Standards: There are a number of standards and acts relating to general Information Security, including industry specific schemes. These include ISO17799, the UK Data Protection Act, the US Health Insurance Portability and Accountability Act (HIPAA), VISA and MasterCard schemes.

Conclusions
Third party validation of organisations’security is becoming more prevalent (and indeed required), through security assessments. In order to ensure that testing is of the required quality and depth, clients must ensure their suppliers are able and qualified on a number of levels. This can in part be achieved by ensuring the methodologies in use are compliant with, and ideally exceed, those in the public domain.

http://www.ebcvg.com/articles.php?id=273

Read more

Intrusion prevention security tipped to boom in Europe

Posted on October 11, 2004December 30, 2021 by admini

“The IPS market in Europe is a few quarters behind North America. But a couple of quarters ago is the time when IPS took off in the US,” said Kip McClanahan, chief executive of TippingPoint, speaking at the NetEvents gathering of networking analysts, vendors and press in Barcelona on Friday. He added that TippingPoint expected to see a “very significant” uptake in demand in Europe, Middle East and Africa.

Intrusion prevention systems conduct deep-packet inspection of the traffic moving across a company’s network. TippingPoint argues that IPS is a more sensible choice than an intrusion detection system, which will alert a network administrator of potential problems but not act against them.

Price tags of £50,000 are not uncommon — but in today’s security climate they can make sense for large companies, and organisations such as universities which can’t trust their end users to run their own security protection. Both TippingPoint and Internet Security Systems, another IPS vendor, are keen to point out that IPS products protect against vulnerabilities rather than just exploits. Both companies say that their customers were protected from the recent JPEG virus, because the vulnerability it took advantage of had already been identified.

Other security companies told the NetEvents audience that 802.1x, which places authentication on each network port, will play a big role in network security. But the IPS vendors say it isn’t enough to just put security on the perimeter. “If I’m a malicious employee and I want to run something bad on your network, then port monitoring won’t stop me,” said Marc Willebeek-LeMair, TippingPoint’s chief technology and strategy officer.

http://news.zdnet.co.uk/internet/security/0,39020375,39169783,00.htm

Read more

Spyware illegal in US

Posted on October 11, 2004December 30, 2021 by admini

Offenders who use spyware to commit other crimes such as stealing user’s credit card details, or computer cracking, could be sentenced up to five years of jail.

The legislation authorises the US Department of Justice to spend $10m targeting organisations which sneak rogue programs on users’ PCs without their consent.

As well as spyware, the bill also targets people and organisation responsible for launching “phishing” attacks.

http://www.xatrix.org/article3671.html

Read more

Ten things I wish they warned me about PKI

Posted on October 8, 2004December 30, 2021 by admini

Idenitification flexibility
CA hierachy
Cross Certification
Revokation
Other organization’s revokations
Liability
Idenitity Provisioning
Organization
Economic Model

http://www.ebcvg.com/articles.php?id=271

Read more

SANS unveils top 20 security vulnerabilities

Posted on October 8, 2004December 30, 2021 by admini

The SANS list is compiled from recommendations by leading security researchers and companies around the world, from institutes such as the National Infrastructure Protection Center and the U.K.’s National Infrastructure Security Coordination Centre.

The Top-20 is actually two lists of 10: the 10 most commonly exploited vulnerabilities in Windows, and the 10 most commonly exploited vulnerabilities in Unix and Linux.

Many of the vulnerabilities have made the list before, but there were some surprises this year, according Ross Patel, director of the Top-20 list. As with IM, file-sharing applications are simple and operational in nature, and security concerns are often overlooked, Patel said.

“Hands down, Web browsers for Windows were the topic that caused most of the harm, pain and passionate debate for experts from every continent,” Patel said. With the number of vulnerabilities in Microsoft Corp.’s Internet Explorer browser prompting some security experts to suggest earlier this year that users switch to other browsers, list contributors were left wondering whether they should recommend the same, Patel said. However, they finally decided that the move was too much to ask and that they should endorse securing whichever platform a user chooses.

According to Gerhard Eschelbeck, chief technology officer at network security firm Qualys Inc. and a list contributor, the Top-20 is widely used by organizations as a security benchmark.

http://www.computerworld.com/securitytopics/security/story/0,10801,96516,00.html

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme