Entries by admin

SecurityOrb.com Interviews Counter Terror Expo US Representives

The Counter Terror Expo US is coming to Washington, DC on May 16 and 17 to the Washington Convention Center. I had the esteemed opportunity to interview Wayne Crawford, Vice President of North America, Clarion Events for Counter Terror Expo US and Amb. David J. Smith, Senior Fellow & Cyber Center Director at the Potomac Institute for Policy Studies during my weekly BlogTalkRadio show. Mr. Crawford provided a wealth of information about the upcoming event while Amb. Smith gave some insight about the topic he will be discussing at the Expo.

IT Security Certification (Part 2)

According to a survey by InfoSecurity magazine that stated IT professionals’ average salaries overall decreased by 5.5%, while those in IT security increased by 3.1% show that experience in security is a valuable skill.

Furthermore, The US Department of Defense (DoD) Directive 8570.1-M requires every part-time or full-time military member or defense contractor that has access to a privileged DoD system to be held by trained and CERTIFIED personnel in a commercial certification to enhance Information Assurance (IA) of the US Department of Defense’s (DoD) information, information systems, and networks.

The Federal System’s Need for a Security Assessment Process, Part 2: Categories of Security Assessments

Security assessments can fall into many categories and an organization’s core competency often dictates which ones management is more interested in conducting. For example, an organization that has an external presence may be very interested in how they appear to the outside world and how well they are protecting their internal resources from external entities trying to harm them. Whereas, another governmental institution maybe more concerned with their internal security posture and controls as compared to how they appear to the outside world. They may have a pressing need to verify internal access control, password compliance and proper network segmentation as opposed to what protocols are accessible from the public network. The actual type of assessment performed usually depends on the organization’s mission as well as their overall security need.

LulzSec & Anonymous Hackers Arrested

  Just last week we told you about a string of arrests in several South American countries, all of which were tied to hacktivist group, Anonymous. This week it looks like the feds are taking on LulzSec and it’s now know that the founder reportedly worked with the Feds. The informant in question might sound […]

A Review of Google’s New Privacy Policy

As of March 1, 2012, Google officially combined privacy policies from more than 60 of its services to a single privacy policy. In doing so, Google is now able to take information from users who are logged-in to its products and services and store them into a database.