Send a Message
to garcianic001

Comments

4

Joined

May 26, 2013

garcianic001 Profile

Forums Owned

Recent Posts

Los Angeles, CA

Apple e-book ruling seen as warning to tech industry

must read  (Jul 11, 2013 | post #2)

Fullerton, CA

Hass and Associates Internet Security Information: Cybers...

http://gcn.com/art icles/2013/05/30/g cn30-future-cybers ecurity-internet-d efends-itself.aspx During the first 40 years of the Internet, security has been about patching mistakes that have been made in its architecture and software and defending these vulnerabilities against attacks from the outside. The future will be about creating an environment that is secure by design and has the ability to anticipate rather than merely respond to threats, government and industry experts say. This will not be a single secure infrastructure, but an ecosystem of technologies designed to better handle the basic chores of systems development; identity management and access control; and monitoring, analysis and response. The Internet was not designed to be secure. When originally launched by the Defense Department’s Advanced Research Projects Agency, it was not intended for public use. As it grew, development has always been more about what could be done with it rather than what should or should not be done. Today the Internet has become integral to the economy and security, while cybersecurity has become a front-page issue and observers see the need for fundamental shifts in the way we secure it. “This does not mean perfect security, but instead a model that evolves and learns from change, whether process, technology or threat related,” said Art Coviello, executive chairman of RSA. “We have a tendency to talk about the threat, and there’s not a lot we can do about that,” said Ron Ross of the National Institute of Standards Technology, who heads the implementation program for the Federal Information Security Management Act. Good cybersecurity hygiene is important, Ross said. That means covering the basics of knowing your systems, understanding and managing their configurations, and ensuring that the proper defenses are in place. “But we need to go beyond that and make a difference in architecture and engineering,” he said Related Articles: http://www.dailymo tion.com/video/xyv vlb_hass-and-assoc iates-cyber-news-r eview-nz-alttiita- verkkohyokkaykset- asiantuntija_news# .UafYlEBgdhw http://hass-and-as sociates-cyber-sec urity.blogspot.com /2013/04/internet- users-familiarize- with-scam.html http://my.opera.co m/wanetarose2013/b log/2013/05/28/has s-associates-warni ng-article-interne t-scam-stings-job- seeking-stockton- wordp  (May 30, 2013 | post #1)

Fullerton, CA

Hass and Associates Cyber Security: House passes cybersec...

http://hassassocia tes-online.com/art icles/2013/04/23/h ouse-passes-cybers ecurity-bill-as-pr ivacy-concerns-lin ger/ The House of Representatives go for the second round of Cyber Intelligence Sharing and Protection Act as it passed legislation on Thursday. The newly granted powers are intended to stop computer security threats against a company’s rights and property. But the definitions are broad and vague. The terms allow purposes such as guarding against “improper” information modification and ensuring “timely” access to information, functions that are not necessarily tied to attacks. Once handed over, the government is able to use this information for investigating crimes that are unrelated to the underlying security threat and, more broadly, for “national security” purposes, which is a poorly defined term that includes “threats to the United States, its people, property, or interests” and “any other matter bearing on United States national or homeland security.” The bill’s vague definitions like “cybersecurity purpose” and “cybersecurity system” also raise the frightening possibility of a company using aggressive countermeasures. If a company wants to combat a threat, it is empowered to use “cybersecurity systems” to identify and obtain “cyber threat information.” But the bill does not define exactly how far a company can go, leaving it open to the possibility of abuse. The bill drew support from House Democrats, passing on a bipartisan vote of 288-127, although the White House repeated its veto threat on Tuesday if further civil liberties protections are not added. Some lawmakers and privacy activists worry that the legislation would allow the government to monitor citizens’ private information and companies to misuse it. U.S. authorities have recently elevated the exposure to Internet hacks and theft of digital data to the list of top threats to national security and the economy. Though thousands of companies have long been losing data to hackers in China and elsewhere, the number of parties publicly admitting such loss has been growing. The bill’s supporters say a new law is needed to let the government share threat information with entities that don’t have security clearances. “If you want to take a shot across China’s bow, this is the answer,” said the House bill’s Republican co-author and Intelligence Committee Chairman Mike Rogers. While groups such as the American Civil Liberties Union are displeased, House Democratic Whip Steny Hoyer called the new version of the bill “a significant improvement from what was passed last year.” Senator Jay Rockefeller, the West Virginia Democrat who chairs the Senate Commerce Committee, said he will work with Republican Senator John Thune of South Dakota and leaders of other committees to bring cyber legislation to a vote in the Senate as soon as possible. “Today’s action in the House is important, even if CISPA’s privacy protections are insufficient,” Rockefeller said in a statement. “There is too much at stake – our economic and national security – for Congress to fail to act.”  (May 27, 2013 | post #1)