The litany of the United States Department of Transportation Federal Aviation Administration's Chicago Air Route Traffic Control Center in Aurora, Illinois (containing new, interesting factoids released by Prosecutors), via the superlative reportage of Jason Meisner at the Chicago Tribune. In which, one can deduce the simple, unfortunate truth: Insiders Are The Greatest Threat...
We’ll Worry About it Later Maxim: Effective security is difficult enough when you design it in from first principles. It almost never works to retrofit it in, or to slap security on at the last minute, especially onto inventory technology. Compiled by Roger G. Johnston, Ph.D., CPP, Argonne National Laboratory
Mission Creep Maxim: Any given device, system, or program that is designed for inventory will very quickly come to be viewed—quite incorrectly—as a security device, system, or program. Comment: This is a sure recipe for lousy security. Examples include RFIDs and GPS. Compiled by Roger G. Johnston, Ph.D., CPP, Argonne National Laboratory
NIST 2015 Cybersecurity Innovation Forum has been scheduled for September 9, 2015 through September 11, 2015, at the Walter E. Washington Convention Center in Washington, D.C. The three day forum is sectioned into four tracks icluding Security Automation, Trusted Computing, Information Sharing and Cybersecurity Research. Register for the 2015 Cybersecurity Innovation Forum here.
Well crafted and insightful piece, written by Jai Vijayan, detailing developer security foibles - and in this case - discovered by researchers at the LOEWE Center for Advanced Security Research Darmstadt (CASED). Of which, an astounding number has emerged (56,000,000), of unsecured data resident in cloud systems (in this case PARSE and AWS). Phenomenal.