Enterprise Log Management: An Overview (Part 1) – – FOSE
/
0 Comments
Log management is the collection of self-generated data from IT hardware devices and software applications. The collection of this data can contain useful information about business processes such as the number of errors on a website or even a security issue that displays the number of failed attempts to access a perimeter router.
Fox News Politics Twitter Account Hacked, Reports President Obama Had Been Assassinated
On Monday July 4th, a hacker group called the “Script Kiddies” hacked into the Fox News Politics Twitter account and posted six tweets reporting that President Obama had been assassinated.
FCC and FTC holds Location-Based Services Forum
The Federal Communications Commission (FCC) and the Federal Trade Commission (FTC) is holding a public forum on privacy concerns about cell phones and their ability to track the location of users.
The forum is being held between 9 a.m. to 3 p.m. EDT at the FCC Headquarters, 445 12th Street, SW, Washington DC 20554.
Audio/video coverage of the meeting will be broadcast live with open captioning over the Internet from the FCC’s web page at www.fcc.gov/live. The FCC’s webcast is free to the public. Those who watch the live video stream of the event may email event-related questions to livequestions@fcc.gov. Depending on the volume of questions and time constraints, the panel moderators will work to respond to as many questions as possible during the workshop.
The Federal Information Security Management Act (FISMA)
The Federal Information Security Management Act (FISMA) was established in 2002 as a Federal law designed to increase the security posture of Federal Systems and their supporting entities. Since its establishment, an increasing number of Federal information systems and databases have been integrated into non-Federal agencies, including municipalities, law enforcement, and contractors.
CNN Interview with Kevin Mitnick (Former Hacker)
I ran across an interesting CNN interview with Kevin Mitnick (Former Hacker) as the guess. In the interview, he discussed the importance of having a personal firewall, being aware when using public wireless access points.
He later recommended the use of VPNs when using public wireless access, using a more secure browser such as Google’s Chorme as well as using the “FREE” tool known as “Personal Software Inspector” to let you know if your software is out of date.
U.S. Government Offers Assistance to Lockheed Martin After Security Breach
News on Twitter buzzed recently as security professionals and hackers alike shared information pertaining to a network breach of top U.S. weapons manufacturer Lockheed Martin. Initially it was not immediately clear if any sensitive information was stolen or compromised, but late Saturday evening,Reuters and MSNBC reported “Lockheed Martin Corp., the U.S. government’s top information technology provider, said on Saturday that it detected and thwarted “a significant and tenacious attack” on its information systems network.”
The Department of Homeland Security to Hire 140 Cybersecurity Experts
The Department of Homeland Security is planning to increase its cyber-security workforce to 400 members by adding an additional 140 members by 2012. Phillip Reitinger, deputy undersecretary of the DHS’s National Protection and Programs Directorate, stated, “we plan to hire 140 additional cybersecurity experts by October 2012 bringing the agency’s total to 400.”
Facebook, Google and Apple Appear before Senate Subcommittee on Mobile Device Location Privacy Issues
On May 19, Facebook, Google and Apple appeared before a Senate subcommittee on Capitol Hill lead by Senator John Rockefeller, D-West Virginia, and Senator John Kerry, D-Massachusetts, to discuss claims they are not adequately safeguarding their customers’ location privacy on mobile devices.
FCC, FTC to Hold Forum on Cell Phones Tracking Users
The Federal Communications Commission (FCC) and the Federal Trade Commission (FTC) plan a public forum next month on privacy concerns about cell phones and their ability to track the location of users.
The June 28 forum will include recommended best practices individuals can use to guard their privacy.
Enabling a CAC Card Reader on Ubuntu 10.04
I recently installed Ubuntu 10.04 on a PC and for those of you who utilize a Linux or a Mac-based system with a need to access a CAC card reader you are in luck. I have researched all over the Internet and found the best site with full instruction on how installed a CAC reader that will work with Ubuntu and Firefox 3.
