Twitter Feed

Twitter cannot show tweets right now. Please try again.

Twitter cannot show tweets right now. Please try again.

Twitter cannot show tweets right now. Please try again.

Share

Posts Tagged ‘Risk’

National Institute of Standards and Technology (NIST) – Security and Privacy Controls for Federal Information Systems and Organizations

Latest Daft – Comments on SP 800-53, Revision 4 should be sent by March 1, 2013, to sec-cert@nist.gov.

NIST -Security and Privacy Controls for Federal Information Systems and Organizations

“…Through the process of risk management, leaders must consider risk to US interests from adversaries using cyberspace to their advantage and from our own efforts to employ the global nature of cyberspace to achieve objectives in military, intelligence, and business operations… “

“…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations…”

“…Leaders at all levels are accountable for ensuring readiness and security to the same degree as in any other domain…”

— THE NATIONAL STRATEGY FOR CYBERSPACE OPERATIONS OFFICE OF THE CHAIRMAN, JOINT CHIEFS OF STAFF, U.S. DEPARTMENT OF DEFENSE

Share

 

From the Sun Tzu masterpieceThe Art of War

It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not know your enemies but do know yourself, you will win one and lose one; if you do not know your enemies nor yourself, you will be imperiled in every single battle.

 

Translation

  • If you know others and know yourself, you will not be imperiled in a hundred battles; if you do not know others but know yourself, you win one and lose one; if you do not know others and do not know yourself, you will be imperiled in every single battle.
  • Know your enemy and know yourself, find naught in fear for 100 battles. Know yourself but not your enemy, find level of loss and victory. Know thy enemy but not yourself, wallow in defeat every time.

 

Share
Network security firm WatchGuard Technologies released a list of social media at highest risk of corporate network security.
.... IT administrators can now choose to allow, block or restrict access to applications by department, job function, time and day, as well as create usage reports.
Read the rest of this entry »
Another Adobe Security Bulletin (APSB11-08) has been posted to address critical security issues in the products, including CVE-2011-0611 as referenced in Security Advisory APSA11-02.
Adobe recommends users apply the updates for their product installations. Read the rest of this entry »
If you do what you've always done, you'll get what you've always gotten. ~Tony Robbins Read the rest of this entry »
Due to the sheer size of the Epsilon Marketing Breach, the list of affected companies grows daily. Here is a list of the affected companies reported so far: # is 65 Read the rest of this entry »
Epsilon partner ReturnPath – which provides monitoring and authentication services to email service providers – warned customers about a series of coordinated phishing and hacking attacks leveled at the mailing list industry. Epsilon failed to take warning Read the rest of this entry »
Alliance Data Systems Corporation (NYSE: ADS), parent company of Epsilon, today reaffirmed Epsilon’s previous statement that the unauthorized entry into an Epsilon email system was limited to email addresses and/or customer names only. No personal identifiable information (PII) was compromised, such as social security numbers, credit card numbers or account information. Read the rest of this entry »
More sites added today to the reported Epsilon Marketing Breach. Read the rest of this entry »

Newly Released – a customized version of the Symantec Internet Security Threat Report for 2010.

Symantec Logged 286 Million Threats In 2010… more than 40 percent more mobile vulnerabilities than a year ago.

Download

Share