Cyber Defense

Info Systems Students To Showcase Final Projects At June 12 Capstone Fair

TROY ? A Sharepoint Portal development project is among 29 student projects that will be showcased June 12, at the Walsh College Business Information Technology and Information Assurance Capstone Fair at the Troy campus. The fair is free to the public. The Capstone project demonstrates to faculty, family, fellow students, and industry professionals that students

By |2010-05-21T00:00:00-04:00May 21st, 2010|Archive, Cyber Defense|

Electronic Discovery Explosion To Open Doors For IT Solutions Providers

SAN FRANCSICO - Organizations will increase their use of electronic discovery, according to new research from IT trade association CompTIA, which will open up opportunities for IT solution providers with the right skills and expertise. E-discovery conventionally refers to the discovery process in civil litigation using electronically stored information. However, many firms routinely engage in

By |2010-05-17T00:00:00-04:00May 17th, 2010|Archive, Cyber Defense|

CA, Poneman Institute Study Show Security Concerns About Cloud Computing

NEW YORK ? CA and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, report somewhat unsettling results from a study analyzing significant cloud security concerns that persist among IT professionals when it comes to cloud services used within their organization. The study, entitled "Security of Cloud Computing

By |2010-05-13T00:00:00-04:00May 13th, 2010|Archive, Cyber Defense|

CA Releases New ARCserve Family

NEW YORK - CA has announced the release of CA ARCserve r15. The solution set includes CA ARCserve Backup - CA's traditional offering in this space - two rebranded CA solutions, which are now ARCserve Replication and CA ARCserve High Availability, and an innovative new disk-to-disk backup and restore product, CA ARCserve D2D. The ARCserve

By |2010-05-07T00:00:00-04:00May 7th, 2010|Archive, Cyber Defense|

A Compact Code-Breaking Powerhouse

SEATTLE - When Robert Trout wants to illustrate cryptography's particular need for speed, he tells the story of the Enigma encryption engine. In 1942 mathematician Alan Turing and his colleagues at Bletchley Park, England's code-breaking headquarters, had reverse-engineered the Enigma, a German encoding device, and the Allies started reading Axis battle plans. Suspecting trouble, the

By |2010-05-07T00:00:00-04:00May 7th, 2010|Archive, Cyber Defense|

UD-Mercy’s DoD Initiative To Move Secure Software Practice To Higher Education

DETROIT - Current software engineering practices inadvertently leave software and systems susceptible to attacks. As evidence, the DHS's Common Weakness Enumeration (CWE) lists 797 explicit defects and the list is growing at a constant rate. These defects cost the average U.S. Company $22 million dollars a year to fix. Moreover, it isn?t like recommendations for

By |2010-05-06T00:00:00-04:00May 6th, 2010|Archive, Cyber Defense|

Facebook Users Reveal Risky Details

NEW YORK - More than half of Facebook and MySpace users surveyed have posted risky personal details about themselves online, according to the results of a new survey from Consumer Reports. The magazine's State of the Net 2010 report, published in its June 2010 issue and discussed in its Electronics blog on Tuesday, also discovered

By |2010-05-06T00:00:00-04:00May 6th, 2010|Archive, Cyber Defense|

Former MySpace Security Chief Starts Company

SAN FRANCISCO - After four years as chief security officer at MySpace, Hemanshu Nigam is leaving his full-time job to start a new firm that advises companies on how to handle safety, security, and privacy. Nigam, who will continue to advise MySpace and its parent company News Corp., hopes to bring his expertise to start-ups,

By |2010-05-06T00:00:00-04:00May 6th, 2010|Archive, Cyber Defense|