Information about general information security issues.

The 2010 Computer Security Salary Survey

/
The 2010 Computer Security Salary Survey was launched this morning. Please complete it today or at least this week (takes 5 minutes). A valid survey is probably the most valuable tool security people have to have productive conversations with their employers about their salaries. You get the results if you participate.

Run ArcSight Express on the Apple iPad

/
Now you can have total security intelligence at your fingertips - anywhere, anytime. ArcSight Express is so easy to deploy and simple to use, we are running it on an Apple iPad. In fact, we are having so much fun that we are offering an Apple iPad certificate with every purchase of ArcSight Express in August or September.* Learn more about this offer and how you can protect your business with ArcSight Express:

Top 10 Countries Sending Spam (Jul 19-Jul 25)

/
Though the top four positions remained the same last week compared to the week before, Brazil continues to slowly account for a larger percentage of the spam pie. Russia and the United States had larger than usual gains (up 1.2% and 1.4% respectively) according to data collected by ICSA Labs. The increase for the United States was enough to move that country into the 5th position among the Top 10 Countries Sending Spam. See who else rounds out the top 10. Also see the graphrepresenting spam percentages over the last several months for many of the top spam sending nations.

August Issue of Hakin9: Securing the Cloud – Free Download

/
August issue of Hakin9: Securing the Cloud New issue of Hakin9 magazine already available! Inside: Prey: A New Hope by Mervyn Heng An introduction to Reverse Engineering: Flash, .NET by Nilesh Kumar Web Malware - Part 1 by Rajdeep Chakraborty Cyber warfare with DNSbotnets by Francisco Alonso Search Engine Security and Privacy by Rebecca Wynn Securing the Cloud: Is it a Paradigm Shift in Information Security? by Gary Miliefsky Radio Frequency-enabled Identity Theft by Julian Evans Intelligence Monopolies by Matthew Jonkmann Special Report: Capturing the New Frontier: How To Unlock the Power of Cloud Computing by Mike Armistead

Black Hat Uplink USA

/
This year thousands of security professionals from around the world are making plans to be a part of Black Hat USA 2010. But not all of those people will actually be in Las Vegas. With Black Hat Uplink, you can experience essential content that shapes the security industry for the coming year. Register now for Black Hat Uplink with Promo Code BH80UL to activate your discount (limited number of seats available).

Insider Threat Still a Big Issue to Network Security

/
Internal users continue to be the torn in system and security administrator's side. This is the case for many reasons. One, they have knowledge of the networking recourses. Two, they have credentials to access various systems on the network and third, most security controls defend against external entities as compared to internal users. According to the Computer Security Institute (CSI), approximately 80 percent of network misuse incidents originate from inside the network.

The CSIS Commission on Cybersecurity for the 44th Presidency has been Released

/
The CSIS Commission on Cybersecurity for the 44th Presidency has released its final report, "Securing Cyberspace for the 44th Presidency." The Commission’s three major findings are:

85% of All Crimes Leaves a Digital Fingerprint

/
It has been stated that 85% of all crime leaves a digital fingerprint in electronic devices. This may occur from an Internet intrusion, identity theft and traditional crime like murder. Computer forensics has aided in the investigation of these crimes. Computer Forensics is the use of specialized techniques for recovery, authentication, and analysis of electronic data when a case involves issues relating to reconstruction of computer usage, examination of residual data, authentication of data by technical analysis or explanation of technical features of data and computer usage.

VMWare Fusion on Mac OS X: How to shutdown Windows when it is hung

/
I have been running VMWare Fusion with Windows XP as my guest OS for some time on my MacBook Pro. The other day, Windows XP while shutting, just hung as it seems to do from time to time on regular PC-based installed. I spent 2-days, waiting for it to complete. I even used the: VMware Fusion menu bar > Virtual Machine > select Power Off But it seem by using: VMware Fusion menu bar > Virtual Machine > press the option key and select Power Off It is the equivalent of pulling the plug out of the wall and it worked. Hope this will help someone out as it did me. Kellep

Cyber ShockWave Explained and Results

/
A simulated exercise titled “Cyber ShockWave” held by the Bipartisan Policy Center took place yesterday, February 16 at the Mandarin Oriental Hotel in Washington, D.C. The exercise was a simulated cyber-attack on the United States to see how well members of the government would respond to a large-scale cyber-attack on the nation's critical infrastructure. The participants were a group of former national security and administration officials from both the Democratic and Republican Party.