Thursday, April 23, 2009

Hathaway advocates for direct White House role on cybersecurity

___________________________________________________________
Computerworld Security
April 23, 2009
___________________________________________________________

***************SPONSOR**************************************

Bringing Endpoints into Compliance - And Keeping Them There

BigFix's high performance systems and security management is uniquely positioned
to provide retailers with the visibility and control needed to effectively meet
PCI compliance. Discover how your organization can contain costs, improve speed
to audit, and ensure continuous assessment and remediation with little to no end
user impact.

http://cwflyris.computerworld.com/t/4872521/283856143/184275/0/?3e076d18=YXVzdGluYW1lczIwMDgucGNtYWdAYmxvZ2dlci5jb20%3d&x=2f7d518e

************************************************************

In this issue:

1. Hathaway advocates for direct White House role on cybersecurity

2. Obama administration said to consider military cybercommand

3. One bot-infected PC = 600,000 spam messages a day

4. Cloud computing a 'security nightmare,' says Cisco CEO

5. Rigged Word docs exploit 2008 bug, say researchers

6. Researchers turn Conficker's own P2P protocol against itself

7. Has RSA Jumped the Shark?

8. New surveys on small business security and success

9. Douglas Schweitzer: Cyber-attacks on Pentagon's weapons program

10. Douglas Haider: RSA inspired thoughts on wireless security

11. Click fraud rate drops in Q1


OTHER RESOURCES
_______________

The NetApp Storage Efficiency Guide
http://cwflyris.computerworld.com/t/4872521/283856143/178497/0/

Preventing Data Loss When Migrating to Microsoft 2007
http://cwflyris.computerworld.com/t/4872521/283856143/184875/0/

_______________

Hathaway advocates for direct White House role on cybersecurity

President Obama's acting senior director for cyberspace called for a more direct
White House role in coordinating national cybersecurity efforts.
http://cwflyris.computerworld.com/t/4872521/283856143/185516/0/

Obama administration said to consider military cybercommand

The Obama administration is considering a new military cybercommand to protect
Defense Department networks and develop offensive cyberwarfare capabilities,
according to The Wall Street Journal.
http://cwflyris.computerworld.com/t/4872521/283856143/185517/0/

One bot-infected PC = 600,000 spam messages a day

Some bot-infected PCs can crank out as many as 25,000 spam messages per hour,
according to new research from a security firm.
http://cwflyris.computerworld.com/t/4872521/283856143/185518/0/

Cloud computing a 'security nightmare,' says Cisco CEO

If anyone has the right to be excited about cloud computing, it's John Chambers.
But on Wednesday Cisco Systems' Chairman and CEO conceded that the computing
industry's move to sell pay-as-you-go computing cycles available as a service on
the Internet was also "a security nightmare."
http://cwflyris.computerworld.com/t/4872521/283856143/185519/0/

Rigged Word docs exploit 2008 bug, say researchers

Attackers who are probably based in China are exploiting a December bug in
Microsoft Word to hijack Windows PCs, Vietnamese security researchers warned
today.
http://cwflyris.computerworld.com/t/4872521/283856143/185520/0/

Researchers turn Conficker's own P2P protocol against itself

Security researchers have updated a free tool that sniffs out the Conficker worm
on infected PCs by using the same peer-to-peer protocol the malware uses to
communicate with its hacker masters.
http://cwflyris.computerworld.com/t/4872521/283856143/185521/0/


***************SPONSOR**************************************

Become a Member of Computerworld's Inner Circle

Computerworld's Inner Circle is a research panel made up of IT professionals and
executives. Results of surveys provide insight into various technology topics
and top issues faced by the IT community. Participants receive the research
results free and may also be eligible in drawings for other exciting prizes.

To join Computerworld's Inner Circle please use the following link:
http://cwflyris.computerworld.com/t/4872521/283856143/169848/0/

************************************************************


Has RSA Jumped the Shark?

RSA Conference 2009 is still going on, but for me, the trip is just about over.
I sit in the airport, trying to put the last few days in perspective. [Related
slideshow: Scenes from RSA Conference 2009]
http://cwflyris.computerworld.com/t/4872521/283856143/185522/0/

New surveys on small business security and success

Understanding small business is tough because there are so many of them and they
vary so widely. But all small businesses share certain problems, attitudes, and
approaches to those problems. Let's give a hand to Symantec and Network
Solutions for doing their part to discover the state of security and creating
(and studying) the Small Business Success Index.
http://cwflyris.computerworld.com/t/4872521/283856143/185523/0/

Douglas Schweitzer: Cyber-attacks on Pentagon's weapons program

Like everyone in IT, I'm all for beefing up cybersecurity. When it comes to
government-run system operations, funding usually suffers though. Nevertheless,
officials over at the Pentagon are confident that they're sufficiently protected
even though cyber-attacks are a constant on the Pentagon. A couple of days ago I
heard that the security of the new F-35 Joint Strike Fighter had possibly been
compromised by cyber-attackers who were able to get information on the F-35
electronics and logistics system that could let enemies protect themselves
against the fighter aircraft.
http://cwflyris.computerworld.com/t/4872521/283856143/185524/0/

Douglas Haider: RSA inspired thoughts on wireless security

With the RSA conference in full swing, the theme of the week is definitely
security. However, RSA focuses on traditional security products and not my
niche, which is wireless & mobile security. Nevertheless, all the security
related blogging and tweets did get me thinking about mechanisms for wireless
security in the enterprise. One of the main instruments for enterprise class
wireless security is a wireless intrusion detection system (WIDS) or wireless
intrusion prevention system (WIPS).
http://cwflyris.computerworld.com/t/4872521/283856143/185525/0/

Click fraud rate drops in Q1

Click fraud, a scam based on the highly profitable search advertising business,
dipped in the first quarter after hitting an all-time high in the last three
months of 2008.
http://cwflyris.computerworld.com/t/4872521/283856143/185526/0/


***************SPONSOR**************************************

Optimizing Data Storage for Software Development

Failure to address the unique data storage challenges of software development
environments can increase costs, decrease developer efficiency, and ultimately
delay time to market or compromise product quality and functionality.
Whether your problem is low storage utilization, performance, remote access,
heterogeneous support, data protection, testing, or compliance, NetApp offers
solutions that can address the issue without breaking your budget.

http://cwflyris.computerworld.com/t/4872521/283856143/184257/0/

************************************************************


SHARK BAIT OF THE DAY
_____________________

Desktops on desk tops

I'm amazed by the number of users in my workplace who seem to resent the desktop
PC being on the top of their desk, instead of by their feet. There are many
downsides to having it by your feet ...

http://cwflyris.computerworld.com/t/4872521/283856143/185303/0/

SEEKING THE VERY BEST IT LEADERS
________________________________

Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at

http://cwflyris.computerworld.com/t/4872521/283856143/183552/0/
(Send questions to premier100@computerworld.com.)


NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwflyris.computerworld.com/t/4872521/283856143/156832/0/

COMPUTERWORLD ON TWITTER
________________________

Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld
http://cwflyris.computerworld.com/t/4872521/283856143/126780/0/


___________CONTACTS/SUBSCRIPTIONS___________________________


FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com


ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.


PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/4872521/283856143/72509/0/

SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.

To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/4872521/283856143/72510/0/

To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/4872521/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz00ODcyNTIx&x=c2597253

If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.

Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/4872521/283856143/72511/0/

Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701

No comments: