Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Army Times article, second below, reports what the beginning of what I expect will be a major decline in functionality of Army computer systems.  While some sort of institutional response to the alleged Wikileaks traitor, Specialist Bradley Manning, is appropriate, I don’t think this is it.  This is a simplistic approach, the sort of thing …

ADMIN: Malware Defeated, Google Helped, Lessons Learned

We have eradicated the Malware that snuck in with a comment. It was a two-step process. 1) Delete all comments and then Close Comments. 2) Find the infected file that reactivated itself each time an unsecured computer visited Phi Beta Iota–evidently the robots are resident everywhere. We should have reacted to Google’s warning signals sooner. …

Journal: Pentagon as VERY Slow Learner….

Time.com    March 18, 2010 To Battle Computer Hackers, The Pentagon Trains Its Own By Mark Thompson, Washington “More than 100 foreign intelligence organizations are trying to hack into U.S. systems,” Deputy Defense Secretary William Lynn warned last month. “Some governments already have the capacity to disrupt elements of the U.S. information infrastructure.” So the Pentagon …

Journal: Information Security Seven Guiding Principles

RSA Executives Offer Seven Guiding Principles To Maximize Megatrends Redefining the Information Security Industry LONDON, Oct. 20 /PRNewswire/ — RSA® CONFERENCE EUROPE 2009 — Building a systemic security strategy to help organizations better face challenges and exploit opportunities spurred by next generation technology trends was the theme of the opening keynote at the 2009 RSA …