Call For Papers - Penn State Harrisburg's Intelligence Community Center for Academic Excellence (IC CAE) Symposium

Call For Papers - Penn State Harrisburg's Intelligence Community Center for Academic Excellence (IC CAE) Symposium


Call For Papers - Penn State Harrisburg's Intelligence Community Center for Academic Excellence (IC CAE) Symposium

Posted:

InfoSec News: Call For Papers - Penn State Harrisburg's Intelligence Community Center for Academic Excellence (IC CAE) Symposium: CALL FOR PAPERS AND PRESENTATIONS
Penn State Harrisburg's Intelligence Community Center for Academic Excellence (IC CAE) Symposium
Intelligence and Homeland Security: Policy and Strategy Implications
CALL FOR PAPERS AND PRESENTATIONS
Penn State Harrisburg's School of Public Affairs invites proposals for papers, presentations, and panel discussions to be presented at the first Intelligence Community Center for Academic Excellence Symposium, Thursday and Friday, September 23-24, 2010,in Harrisburg, Pa.
Proposals should be sent no later than June 11, 2010 to: Tom Arminio and Kate Corbin Tompkins intell-hls-sym (at) psu.edu Office: 717-948-6058 Mobile: 717-405-2022
Proposals should be no longer than a one-page abstract, preferably in MS Word or PDF, that includes: the title of your presentation; your name, title, and contact information; and your institutional affiliation or organization. Panel and breakout session leads will be identified at a later date.
Please direct general questions about the program or proposal topics not identified at right to Tom Arminio. Students are encouraged to submit proposals.
Potential topics: * Careers in the intelligence community * Cyber security and information assurance * Border security * Critical infrastructure protection (CIP) * Intelligence and information sharing - domestic and international * Fusion centers * Ethical issues in intelligence * Operations security (OPSEC) * Terrorism * Drug cartels * Private sector and NGOs * Public health * Geospatial information * Counter-proliferation

Android App Aims to Allow Wiretap-Proof Cell Phone Calls

Posted:

InfoSec News: Android App Aims to Allow Wiretap-Proof Cell Phone Calls: http://blogs.forbes.com/firewall/2010/05/25/android-app-aims-to-allow-wiretap-proof-cell-phone-calls/
By Andy Greenberg The Firewall Forbes.com May 25, 2010
Worried about the NSA, the FBI, criminals or cyberspies electronically eavedropping on your private phone calls? [...]

VA Security Compromised By Medical Devices

Posted:

InfoSec News: VA Security Compromised By Medical Devices: http://www.informationweek.com/news/healthcare/security-privacy/showArticle.jhtml?articleID=225200097
By Nicole Lewis InformationWeek May 25, 2010
At a congressional hearing last week, Roger Baker, assistant secretary for information and technology at the Department of Veterans Affairs, [...]

Default Database Passwords Still In Use

Posted:

InfoSec News: Default Database Passwords Still In Use: http://www.darkreading.com/database_security/security/app-security/showArticle.jhtml?articleID=225200102
By Ericka Chickowski Contributing Writer DarkReading May 25, 2010
The rampant use of default passwords within live database environments continues to plague the security of enterprise data, researchers say.
"It's a problem that has been around for a long, long time," says Alex Rothacker, manager of Team SHATTER, Application Security Inc.'s research arm. "A lot of default passwords out there get installed when you deploy a database, you install an add-on to it, or even if you install a third-party application that uses the database."
As he puts it, the problem of default passwords lingering in the wild has built up during the years as a result of cumulative errors by both vendors and database administrators. In the past, the majority of vendors had no compunction about pushing out installers that automatically created default accounts to expedite the deployment of new databases, add-ons, or applications on top of the database.
"In order to perform some of the installation functions, they need to create database accounts, and some of them simply go and create an account and put a default password on it that's well-known to the whole world," he says.
Meanwhile, users did nothing to clean up these default accounts once installation was complete. Rothacker says the situation on the vendor front has improved considerably in recent years, but default passwords continue to be a problem for a number of reasons.
[...]

Denver's website hacked twice in one week

Posted:

InfoSec News: Denver's website hacked twice in one week: http://www.denverpost.com/news/ci_15155519
By Joey Bunch The Denver Post 05/25/2010
The city and county of Denver website was pulled down Monday night after it was hacked, the second such attack in a week.
Eric Brown, a spokesman for the mayor's office, said he didn't know what [...]

0 comments:

Post a Comment