Cyber Defense

Google Patches 7 Security Holes In Chrome

MOUNTAIN VIEW - Just before the Black Hat security conference begins, Google has patched seven security holes in its stable version of Chrome and begun an effort to speed up the software industry's response to such vulnerabilities. Google paid two $1,337 bounties for work that lets Chrome avoid critical security problems by sidestepping vulnerabilities in

By |2010-07-27T00:00:00-04:00July 27th, 2010|Archive, Cyber Defense|

Legislating Global Internet Freedom

BIRMINGHAM - There is a disturbing tendency on the part of the US Congress to legislate the Internet. A case in point is HR 2271 backed by eleven US Represntatives and submitted to review by the House Energy and Commerce and Foreign Affairs Commitees last May(2009). Thankfully, there has been no serious deliberation on this

By |2010-07-27T00:00:00-04:00July 27th, 2010|Archive, Cyber Defense|

Google Chrome Gets Multiple Security Fixes

MOUNTAIN VIEW - The stable version of Google Chrome received multiple security fixes earlier this month, including four rated as "high," while the developer's version adopted an interface tweak to create more room for extension icons. Google Chrome dev 6.0.453.1 for Windows, Mac, and Linux consolidates the former page control menu into the customization menu

By |2010-07-13T00:00:00-04:00July 13th, 2010|Archive, Cyber Defense|

Walsh College Open Source Group Summer Meetings

TROY - The group is open to all Walsh Students, Alumni, and the public and is provided free of charge. This is a great opportunity to learn about developing web sites, configuring Linux servers, discussing design patterns, plus numerous other topics related to Internet technology. If you're already an expert in one of these fields,

By |2010-06-15T00:00:00-04:00June 15th, 2010|Archive, Cyber Defense|

IT Security To Decline As Percentage Of IT

STAMFORD, Conn. - While security risks are not going away for companies, efficient and secure enterprises will actually safely reduce the share of security spending by 3 to 6 percent of their overall IT budgets through 2011, according to research and analyst firm Gartner. Organizations with very mature and recently updated security programs will be

By |2010-06-15T00:00:00-04:00June 15th, 2010|Archive, Cyber Defense|

Northern Border Security Conference July 27-28

DETROIT ? Leslie Touma, president and founder of the Michigan Security Network, explains why anyone involved in security in the Great Lakes region should attend the Northern Border Security Conference July 27-28 at the Hyatt Regency in Dearborn. To listen, click on MITechNews.JenesysGroup.Com a>>

By |2010-06-08T00:00:00-04:00June 8th, 2010|Archive, Cyber Defense|

Ken Theis State CIO On Departmental Merger

LANSING ? Ken Theis, the Michigan chief information officer, plus director of the new Department of Technology Management and Budget, provides an update on how the consolidation process has gone so far and where he sees it headed over the next three to five years. To listen, click on MITechNews.JenesysGroup.Com a>>

By |2010-06-08T00:00:00-04:00June 8th, 2010|Archive, Cyber Defense|