June 2013
SC Magazine: For IT Security Professionals (15476693);Jun2013, Vol. 24 Issue 6, p12
This section offers news briefs relating to information technology security. The hacktivist group Syrian Electronic Army took responsibility for hijacking the Twitter account of the Associated Press and posting a message about explosions at the U.S. White House. The Web site LivingSocial has updated its password encryption method from the outdated SHA1 to the bcrypt hashing algorithm. A proposed 4.7 billion dollars will be given to the U.S. Department of Defense for cyber security initiatives.


Related Articles

  • Private Sector Ushers Military Into New Era of Cybersecurity. Siedsma, Andrea // San Diego Business Journal;3/29/2010, Vol. 31 Issue 13, p18 

    The article discusses the efforts of the private sector to help the U.S. Defense in creating cyber infrastructure and security networks for its information technology (IT). It states that San Diego, California-based Sentek Global, which specializes in government and commercial IT security, is...

  • Certifiably Secure.  // Aviation Week & Space Technology;1/28/2013, Vol. 175 Issue 3, pDT20 

    The article focuses on the U.S. Defense Advanced Research Projects Agency's Vetting Commodity IT Software and Firmware which will examine commodity information technology devices procured by the Defense Department and assure they are free of malicious functionality.

  • The Transition Begins: DoD Risk Management Framework. Ellett, Jennifer M.; Khalfan, Shaun // CHIPS Magazine;Apr-Jun2014, p14 

    The article discusses the transition of the U.S. Department of Defense (DoD) to the Risk Management Framework (RMF) for DoD Information Technology (IT). Topics covered include the updated foundational DoD instruction on cybersecurity, the requirements of the RMF, the way the transition to the...

  • IT security: the dangers, the solutions and the sales pitches. Smyth, Robert // Budapest Business Journal;3/9/2003, Vol. 11 Issue 12, p17 

    Focuses on information technology (IT) security in Hungary. Ways of attacking a company's computer system; Targeting of the majority of viruses towards Microsoft; Security companies' offer of services in the form of an all-in-one solution; Measures that companies need to take in order to...

  • Security and IT: Protecting PCs and Data.  // Security: Solutions for Enterprise Security Leaders;May2000, Vol. 37 Issue 5, p64 

    Reports on the findings of a `SECURITY' magazine nationwide survey on information security in the United States. Protection of computer centers; Roles of information technology and security professionals.

  • Information Security Policy. Mead, Nancy // IEEE Software;Sep/Oct2000, Vol. 17 Issue 5, p26 

    Presents a roundtable discussion about information security policy. Participants of the roundtable discussion; Views on the international standards governing information security policy; Opinions on the open-source approach to security; Comparison on the benefits of closed source to the...

  • White House unveils US IT security code of practice. Goodwin, Bill; Simons, Mike // Computer Weekly;9/19/2002, p2 

    Reports the inauguration of information technology security code of practice in the U.S. Aims of improving computer security in government, business academia and home users.; Response of administration to the September 11 terrorists attacks; Creation of a center to study computer viruses and...

  • Public entities urged to address Internet risks. Rosenberg, Lee Fletcher // Business Insurance;6/18/2001, Vol. 35 Issue 25, p16 

    Reports on the risks faced by public entities related to their information technology systems in the United States. Plan implemented by Sioux Falls, South Dakota to protect the city against Internet-related exposures; Policy on e-mail retention and deletion.

  • Securing the Future.  // ITNOW;Sep2009, Vol. 51 Issue 5, p23 

    The article discusses the issue of security in information technology (IT).


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics