'World's No. 1 hacker' tome rocks security world |
- 'World's No. 1 hacker' tome rocks security world
- Better cybersecurity depends on better information management
- FBI: Hacker demanded sexually explicit videos
- Woman charged with 'hacking' Warwick company's computer
- Trustwave buys application firewall maker
'World's No. 1 hacker' tome rocks security world Posted: InfoSec News: 'World's No. 1 hacker' tome rocks security world: http://www.theregister.co.uk/2010/06/22/worlds_no_1_hacker/ By Dan Goodin in San Francisco The Register 22nd June 2010 A recently published e-book penned by the self-proclaimed "world's No. 1 hacker" is rocking the security community with back-and-forth [...] |
Better cybersecurity depends on better information management Posted: InfoSec News: Better cybersecurity depends on better information management: http://gcn.com/articles/2010/06/22/information-management-better-cybersecurity.aspx By William Jackson GCN.com June 22, 2010 It might sound like heresy, but information sharing is overrated, said Tony Sager of the National Security Agency. IT security officials already are overloaded with information, Sager said. As chief of the vulnerability analysis and operations group in NSA's Information Assurance Directorate, which runs Red Team penetration tests, Sager has generated his share of security information over the past 33 years. But that data often contributes little to improving the security of government IT systems, he said Tuesday at the Symantec Government Symposium on IT security in Washington. "Dumping our inboxes at each other is not going to cut it," Sager said. "Being at the right meeting is not going to do it. The key to success in IT security is information management." E-mail exchanges and meeting attendance don't scale, he noted; an agency official can't increase them indefinitely as the demand rises. Information management means getting the right information into the hands of those who need it. That requires not data dumps, but standards for tools that can analyze data and make it available irrespective of its source; standards such as the Security Content Automation Protocol, jointly developed by the NSA, the National Institute of Standards and Technology and the private sector. [...] |
FBI: Hacker demanded sexually explicit videos Posted: InfoSec News: FBI: Hacker demanded sexually explicit videos: http://www.ocregister.com/news/mijangos-254531-victims-affidavit.html By Larry Welborn The Orange County Register June 22, 2010 SANTA ANA - A Santa Ana man was arrested Tuesday after authorities say he hacked into dozens of computers and demanded sexually explicit videos [...] |
Woman charged with 'hacking' Warwick company's computer Posted: InfoSec News: Woman charged with 'hacking' Warwick company's computer: http://www.warwickonline.com/view/full_story_news/8013298/article-Woman-charged-with--hacking--Warwick-company-s-computer?instance=home_news_right Warwick Beacon June 22, 2010 A Richmond woman has been charged with hacking the computer of BayWatch RI Marine Towing in Warwick. [...] |
Trustwave buys application firewall maker Posted: InfoSec News: Trustwave buys application firewall maker: http://www.computerworld.com/s/article/9178405/Trustwave_buys_application_firewall_maker By Stephen Lawson IDG News Service June 22, 2010 Trustwave has acquired Breach Security for an undisclosed sum, an acquisition that the company said would bring Breach Security's Web [...] |
You are subscribed to email updates from [ISN] InfoSec News Mailing List To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment