Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Apple/Mac
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Experts Cite Need for Obama
Experts Cite Need for Obama's Cybersecurity Action

By Jennifer LeClaire
February 13, 2013 2:12PM

    Bookmark and Share
"We need to be ever vigilant in protecting ourselves from the types of attacks...emerging within the world we live in," said security expert Lawrence Reusing after President Obama's executive order on cybersecurity. "The United States must take a leadership position by defining policies and procedures so that our critical infrastructure is protected."
 



President Obama on Tuesday signed an executive order to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with industry partners. How is the technology industry responding?

Lawrence Reusing, general manager of mobile security at Imation, told us it's not news to say we live in a dangerous world -- but we are in a world that's becoming more and more interconnected every day. He pointed to a reality where organizations are being targeted through remote attacks and their employees are also being targeted as travelers so they can bring malicious threats back into the organization.

"For that reason, we need to be ever vigilant in protecting ourselves from the types of attacks -- and attack vectors -- emerging within the world we live in. The United States must take a leadership position by defining policies and procedures so that our critical infrastructure is protected," Reusing said, noting this includes making sure that nefarious interests cannot directly compromise our systems and that our own government employees are protected from themselves.

"As we've seen on more than one occasion, government employees have inadvertently carried malware and other malicious software into their work areas and have accidentally installed that software onto public IT infrastructure," Reusing said. "The security industry needs to give organizations an advantage over malicious software. A comprehensive approach to cybersecurity will address these and other scenarios."

Public-Private Partnerships

Bill Morrow, CEO of Quarri Technologies, told us recent cyberattacks targeting several high-profile media companies and government agencies provides further proof that nation-states' threats are real. Not surprisingly, he said, criminals today are carrying out very targeted and efficient attacks and are becoming more brazen.

"There is a once-in-a-generation opportunity for our leaders in public and private industry to come together in the coming weeks in an effort to put measures in place to help minimize network risks to critical infrastructure that could occur in the future," Morrow said. "There are also a number of steps the private and public sector can take in what I would call preventative medicine."

First, he argued, it is imperative that private and public industry get a better handle on which threats are the most harmful to our own interests in the United States, as this will allow us to allocate resources in the right places. Second, he continued, private industry is a leader in innovation and many of the best IT security products in the world have been developed within our borders. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.


 Apple/Mac
1.   Google, Rockstar Suit Stays in Calif.
2.   Samsung Tech Experts Talk Patents
3.   Phones Annoy Patent Trial Judge
4.   Apple vs. Samsung: Latest News
5.   Hey Siri, Can You Hear Me Now?


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Heartbleed Could Cost Millions, Could Have Been Prevented
Early estimates of Heartbleed’s cost to enterprises are running in the millions. The reason: revoking all the SSL certificates the bug exposed will come at a very hefty price. Some say it all could have been avoided.
 
Michaels Says Nearly 3M Credit, Debit Cards Breached
Arts and crafts retail giant Michaels Stores has confirmed that a data breach at its POS terminals from May 2013 to Jan. 2014 may have exposed nearly 3 million customer credit and debit cards.
 
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
The innovative headpiece may find its niche in markets where hands-free access to data can be a big advantage. Glass experiments for doctors are already under way, with some promising results.
 

Mobile Technology Spotlight
Review: Siri-Like Cortana Fills Windows Phone Gap
With the new Cortana virtual assistant, Windows catches up with Apple's iOS and Google's Android in a major way, taking some of the best parts of Apple's and Google's virtual assistants, with new tools too.
 
With Galaxy S5, Samsung Proves Less Can Be More
Samsung has produced the most formidable rival yet to the iPhone 5s: the Galaxy S5. The device is the fifth edition of the company's successful line of Galaxy S smartphones, and shows less can be more.
 
Facebook Rolls Out Potentially Intrusive Location-Sharing
Looking for friends? Facebook users in the U.S. will soon be able to see which of their friends are nearby, using a smartphone's GPS. Could be a cool feature in some cases, or way too much information.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.