Friday, March 13, 2009

"Adopting the Six Fundamentals of Information Security"

Learn How To HackClick here to view more details

1. Managing user accounts securely

2. Handling your organization's information securely

3. Protecting mobile devices and storage media

4. Preventing intrusions into corporate facilities

5. Defending against malware

6. Working safely away from the office

Thursday, March 12, 2009

Government Needs To Get Its Cybersecurity In Gear, Experts Tell Congress


Learn How To Hack

Security industry leaders agree that White House should lead revamped cybersecurity effort

Mar 10, 2009 | 06:17 PM

By Tim Wilson
DarkReading

Some of the nation's top cybersecurity experts today told a congressional subcommittee that the United States isn't ready for a major online attack, and called on the White House and the rest of the federal government to get their acts together.

In a hearing held by the House Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, four top IT security officials expressed concern about the government's slow movement in developing a defense for its own agencies and for the nation's critical infrastructure. All four said the White House should lead the effort with the creation of a civilian agency dedicated to cyberdefense.

"We need to face the fact that we are already dealing with cyberwar, both from criminal elements and from hostile governments," said Dave Powner, director of IT management issues at the Government Accountability Office. "We're constantly under attack."

"We're facing the same sort of attack we faced on 9/11, only on a virtual level," said Amit Yoram, CEO of NetWitness and a former White House cybersecurity official. "And without the right defenses, we'll be just as vulnerable."

The experts said that the White House should lead the effort to swiftly build up the nation's defenses against cyberattack. Jim Lewis, project director at the Center for Strategic and International Studies, said the White House is the only part of the government that has the budget and power to drive the initiative, and that only the president can make the decision as to when a cyberattack constitutes an act of war.

Mary Ann Davidson, CSO at Oracle, called on the federal government to develop an analog to the target="new">Monroe Doctrine that would clearly establish a U.S. "cyberturf" and a commitment to defend it with both offensive and defensive cyberweapons.

All of the experts, as well as some members of the subcommittee, expressed concern that the National Security Agency should be given the primary authority over U.S. cybersecurity initiatives. "Intelligence-gathering efforts often work at cross purposes with agencies that are developing defensive strategies," Yoran said.

Rod Beckstrom, the former director of the National Cybersecurity Center who resigned last week in a turf battle with the NSA, was present at the hearing, but did not speak.

The White House is currently conducting a 60-day review of the cybersecurity situation; the review is expected to result in organizational recommendations for the Obama administration. The GAO has not yet met with the review committee, but Powner said his organization is recommending the formation of a White House office responsible for cybersecurity. The GAO also is recommending the creation of a "board of directors" to monitor cybersecurity initiatives and an "accountable" cyberorganization that will speed the development of online defenses.

The members of the congressional subcommittee said they had many more questions for the experts, but they generally favored the recommendations made by the experts.

"The cybersecurity effort has been plagued by ineffective leadership," said Bennie Thompson, chairman of the subcommittee. "We were optimistic about the capabilities of Rod Beckstrom, but it became clear that he did not have experience in working miracles. He did not have the budget or the authority to get the job done. This committee believes, as he does, that there should be a civilian agency that interfaces with, but is not controlled by, the NSA."

Let the (SHARK)Fest Begin!

SHARKFEST is an educational event that offers in-depth instruction over the course of 3 days to the benefit of anyone wishing to enhance their skill set with, and optimize the effective use of, the world's most popular network and packet analyzer. CACE Technologies and Wireshark University will once again host the annual SHARKFEST Wireshark® Developer and User Conference in June of 2009 at Stanford University.

The SHARKFEST'09 session schedule includes many topics geared for new, seasoned, and expert Wireshark users alike, including:

  • Ask the Experts: One-on-One Dissector Development Assistance from Wireshark Core Developers
  • Wireshark Saves the WLAN!
  • Getting Your Code into Wireshark Releases
  • VoIP Troubleshooting with Wireshark
  • Network Forensics: Wireshark as Evidence Collector
  • CACE Pilot + Wireshark Integrated Analysis
  • How Protocols Work
  • Advanced TCP Analysis & Troubleshooting in Enterprise Networks

www.industrionage.com web source relating to Cybersecurity coming soon

Protection for all things Internet and Corporate Data



Industrionage is a word I coined one evening, while sitting through my 3 hour long, Fundamentals of Computer Security class; derived quite obviously, from the term Industrial Espionage.

As far as a brand representing the idea of protecting the integrity of data in the day to day workings of the world wide web, Industrionage is hip.

(Although a fellow student of mine pointed out that Industrionage called to mind an example of the latest adventure in Bushspeak or another "Bushism")

Industrionage rolls off the tongue seductively while at the same time intimating the sense of actions taking place both within electronic data networks and throughout the human elements of corporate operations, that are both dangerous and menancing in nature.

There may be an element of over dramatizing and glamorizing the process of datagram packets as they travel over the wire in the course of their interwebz journey, however the reality is that some very frightening and DANGEROUS events are taking place on the world wide web.

I hope to make the term Industrionage a call to arms in a manner of speaking for adopting secure and conscientious practices when operating in the virtual world.

Federal agencies have reported a dramatic increase in the number of information security incidents. It can't be emphasized enough that the age of innocence is now a bygone era and that we have now entered into a time where security must be a lifestyle, where proactive methods and habits of a warrior's ethos is the norm.

It really can't be posted or discussed enough in reference to how our own government is really pushing the initiative for this new mentality as it applies to the internet and our collective online posture:

The CSIS Commission on Cybersecurity for the 44th Presidency has released its final report, "Securing Cyberspace for the 44th Presidency."

The Commission’s three major findings are:
1. Cybersecurity is now one of the major national security problems facing the United States
2. Decisions and actions must respect American values related to privacy and civil liberties
3. Only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will improve the situation.