HP Holds Navy Network 'Hostage' for $3.3 Billion

HP Holds Navy Network 'Hostage' for $3.3 Billion


HP Holds Navy Network 'Hostage' for $3.3 Billion

Posted:

InfoSec News: HP Holds Navy Network 'Hostage' for $3.3 Billion: http://www.wired.com/dangerroom/2010/08/hp-holds-navy-network-hostage/
By Noah Shachtman Danger Room Wired.com August 31, 2010
Someday, somehow, the U.S. Navy would like to run its networks -- maybe even own its computers again. After 10 years and nearly $10 billion, [...]

Focus on Secrecy Could Hamper Pentagon's Cybersecurity Plans

Posted:

InfoSec News: Focus on Secrecy Could Hamper Pentagon's Cybersecurity Plans: http://threatpost.com/en_us/blogs/focus-secrecy-could-hamper-pentagons-cybersecurity-plans-083010
By Paul Roberts Threatpost.com 08/30/2010
The former head of the Department of Homeland Security's Cyber Security Division warns that the U.S. military's preoccupation with secrecy could [...]

Obama to loosen rules on technology exports

Posted:

InfoSec News: Obama to loosen rules on technology exports: http://www.washingtonpost.com/wp-dyn/content/article/2010/08/30/AR2010083004278.html
By Howard Schneider Washington Post Staff Writer August 30, 2010
The Obama administration is overhauling the decades-old rules for the export of sensitive military and other technology, jettisoning what [...]

[Dataloss Weekly Summary] Week of Sunday, August 22, 2010

Posted:

InfoSec News: [Dataloss Weekly Summary] Week of Sunday, August 22, 2010: ========================================================================
Open Security Foundation - DataLossDB Weekly Summary Week of Sunday, August 22, 2010
5 Incidents Added.
======================================================================== [...]

IT Security Unleashes Employee Complaints

Posted:

InfoSec News: IT Security Unleashes Employee Complaints: http://www.informationweek.com/news/security/client/showArticle.jhtml?articleID=227101732
By Mathew J. Schwartz InformationWeek August 30, 2010
For 12% of CIOs, hearing complaints from employees over IT security measures -- specifically, limits on their access to certain types of [...]

0 comments:

Post a Comment