background preloader

IT Security News and Security Product Reviews - SC Magazine

IT Security News and Security Product Reviews - SC Magazine

http://www.scmagazine.com/

NCSAM Resource Kit - Information Security Guide - Internet2 Wiki 2013 Campus Events Below is a comprehensive list of 2013 higher education NCSAM events. We collected over 190 links this year (a new record)! It's never too early to start planning your 2014 activities. Please continue to share the URL or plans for your NCSAM-related initiatives with the participants of the Security Discussion Group or send an e-mail to: security-council@educause.edu. Cloud Computing Cyber Security Cloud Computing Cyber Security Making the cloud your first line of defense helps to keep intruders away from your network By: John Shepler In days of yore, when castles were in vogue, the nobles found that massive stone fortifications were not enough to secure them from determined invaders. What they did was to ring the castle grounds with a deep water-filled ditch called a moat. This effectively prevented sieges from battering rams and tunneling under the castle walls.

States / Tamil Nadu : Award for painstaking police work The recognition for 35 officers who have been chosen for medals by the Centre and State for meritorious service and excellence in criminal investigation/public service has come as a shot in the arm for the Tamil Nadu Police. In 2011-12, dozens of complex cases were cracked by the police across the State, thanks to the commitment and painstaking work of the investigators. For instance, the Cyber Crime Cell of the Chennai Police secured the first conviction for child pornography under the Information Technology (amended) Act of 2008 in the country. Acting on an alert issued by the Interpol, the Chennai Police apprehended Wilheums (58), a Dutch national, in November 2009.

Backtrack 5 r3 List of (some of the) new Tools and Programs … CYBER ARMS – Computer Security. Cyber War News and Business Computer Tips … Vulnerability Assesment. Lynis – Scans systems & software for security issues; DotDotPwn – Directory Traversal fuzzer. CCD COE - National Strategies & Policies The selection below provides links to national cyber security policy and legal documents, including national security and defence strategies identifying cyber, national cyber/information security strategies, and relevant legal acts. If you see any inconsistencies or would like to notify us of changes or new additions that we have missed, please write to legal-at-ccdcoe.org Updated on 10 March 2014 NATO Nations

Getting Ready for October Awareness Month As some of you may already know, October is National Cyber Security Awareness month in the United States. Led by the National Cyber Security Alliance, and co-sponsored by MS-ISAC and DHS, the goal is to make the United States public aware of cyber security issues and how to better protect themselves. This October will be the 9th anniversary of the event. In addition, ENISA is looking to expand Security Awareness month to Europe. As such, October is the perfect time to add new features to your awareness program, reinforce key points, or perhaps even kick off your awareness program if you do not currently have one. Here are some ideas to consider.

How to Secure Data by Addressing the Human Element – CIO How to Secure Data by Addressing the Human ElementCIO”We define social engineering as understanding what makes a person think, tick, and react and then using those emotional responses to manipulate a person into taking an action that you want them… See on www.cio.com

Anonymous says it hacked 10M PSN accounts; Sony disagrees – ZDNet ZDNetAnonymous says it hacked 10M PSN accounts; Sony disagreesZDNetAnonymous claims to have struck again as far as the Sony PlayStation Network is concerned, but the whole matter appears to be a hoax. See on www.zdnet.com

Related: