Archives: February, 2013
Doug Bedell — February 28, 2013, 11:08 am
Computer hacking via the Internet is becoming an ever more troubling danger. Read the stories of technology journalist Mat Honan and Cloudflare CEO Matthew Prince as they presented them at the RSA conference in San Francisco. Chilling stuff; hacking is a constant peril to any system that’s not regularly backed up and defended as smartly […]
Filed under: IT Security —
Doug Bedell — February 25, 2013, 11:11 am
Note to all concerned about cyber/IT security: Sandia National Laboratories has opened a Cyber security Engineering Research Laboratory (CERL) and Cyber Engineering Research Institute (CERI). The formal opening was on February 19, Government Security News reports. Sandia, a wholly owned subsidiary of Lockheed Martin Corp., “operates Sandia National Laboratories as a contractor for the U.S. […]
Doug Bedell — February 22, 2013, 8:08 am
Wireless services will become an ever-bigger factor in business communication under a move by the Federal Communication Commission (FCC) “to allocate more federal spectrum for unlicensed Wi-Fi use….to support speeds in the gigabit range, a plan first announced by FCC chairman Julius Genachowski on Jan. 11.” That’s the word from Nextgov and it portends ever-increasing […]
Doug Bedell — February 21, 2013, 10:37 pm
Ever heard of APT1? Probably not, but there’s evidence that it’s a unit of the Chinese People’s Liberation Army that’s been conducting massive cyber espionage. Who say’s so? Well, here’s the report of the information security company Mandiant that’s been revving up U.S. government concern over alleged Chinese infiltration of computer systems in western countries. […]
Doug Bedell — February 18, 2013, 11:23 am
Bruce Schneier offers a meditation on trust in the electronic, or information, age. “We’re shifting,” he says, “from evolved social systems to deliberately created socio-technical systems. Instead of having conversations in offices, we use Facebook…:” etc. This is truly a profound change in society’s functioning, and in the economy’s unfolding. We don’t often venture into […]
Doug Bedell — February 15, 2013, 8:31 am
Professional security guards, of course, are a key element in security systems. Yet, once guards are hired, they are sometimes not treated professionally, or expected to act continually in that self-image. Security Directions magazine provides prompting on motivating security officers, as well as other guidance on effective site security. George R. Saunders, a veteran New […]
Doug Bedell — February 13, 2013, 10:35 am
Online copies of homeland security articles are available from Homeland Security Affairs (HSA), The Journal of the Naval Postgraduate School Center for Homeland Defense and Security. At the HSA site you’ll find articles on all sorts of security-related subjects, including, for example, electric cars and energy security, homeland security theory, and security preparedness. This site […]
Doug Bedell — February 11, 2013, 10:55 am
What are security sensors capable of sensing, how fine-grained might they be? That question arises with the disappointing news that the U.S. government’s plan to deploy improved electronic sensors along the nation’s border with Mexico have been delayed for much of 2013, at least. The problem, Wired magazine reports, is not only that available sensors […]
Doug Bedell — February 8, 2013, 11:23 am
Talk about high stakes security monitoring. The. U.S. has a program to monitor container cargo entering the country at 22 seaports for radiation, yes, any indicated nuclear presence. The radiation-detection program, conducted via radiation portal monitors, is the responsibility of Customs and Border Protection and the Domestic Nuclear Detection Office. Government Security News (GNS) reports […]
Doug Bedell — February 6, 2013, 3:58 pm
It looks like a busy year ahead in cyber security. Bill Cull, public sector vice president at Splunk, writes on Government Security News that agencies will be strengthening their defenses against cyber attacks and that “government will attempt to reach a resolution for a national cyber defense posture.” “Cyber security,” Cull continues, “has become one […]