Search This Blog

Sunday, August 28, 2011

Cybersecurity Report: 84% Believe Risk is Higher than 1 Year Ago


With the annual Black Hat (Vegas) conference providing extra focus on cybersecurity this week, but also eclipsing most other news, I want to call attention to the EastWest Institute publication of their report on the Second Worldwide Cybersecurity Summit: Mobilizing for International Action.
The EWI summit, held in London at the beginning of June, attracted more than 450 government, industry and technical leaders from 43 countries to craft new cybersecurity solutions.
CSOs, CIOs, IT professionals, academics, and international policy-makers working to maintain a healthy Internet and guarding resources against cyber threats may went to take a look at the wide range of topics covered in the the EWI summit report. Fortunately, the report is readable from the web, with a solid table of contents and lots of quotes and graphics to help you navigate through the information and find areas of special interest.
EWI held their first Cybersecurity Summit in 2010, and EWI’s cybersecurity initiative has gained participation from the United States, Chinese, Russian and Indian governments, along with other members of the Cyber40 (an informal grouping of the world’s most digitally-advanced nations), academic leaders, and industry professionals.
“The largest roadblock to cyber solutions is a lack of trust,” says John Mroz, EWI President. “EWI’s trademark for three decades has been bringing the people who need to work together into the same room to craft solutions to particular issues of common concern. Nowhere is this needed more than in the cybersecurity arena.”
To highlight how participant’s see the cybersecurity challenge, the report shares (flip to page 7) some interesting survey data from the 2010 and 2011 summits:

  • 84% think that the cybersecurity risk we face today is higher than one year ago
  • 61% doubt that their country could defend against a sophisticated Cyber attack
  • 54% doubt their <business, organization, agency> could defend against a sophisticated Cyber attack
  • 70% believe that international policy and regulations lag far behind technology advances
  • 81% agree that bold steps are needed immediately to address lack of trust in ICT development and supply chain integrity
That last point, which I sometimes refer to as “Trusted Supply Chain” issues, was also one of the key areas of focus for Microsoft participation at the summit and in the recent post by Eric T. Werner, Global Cyber Supply Chain Management a Principal Security Strategist with the Trustworthy Computing group here at Microsoft.
The 50-page report includes information from the keynote presentation on Supply Chain Risk Management delivered by Scott Charney, Corporate Vice President, Trustworthy Computing, including his observation that: “The Internet is different in the sense that you don’t have to put assets at risk to engage in espionage. Spies can sit in their home country and exfiltrate terabytes of data quickly.” 

Friday, August 26, 2011

Keeping malware away - how do some countries do it?


Tim Rains over at Trustworthy Computing (TwC) has just concluded a six-part series in which he took a closer look at the threat landscape in locations that have the lowest infection rates in the world. Using data from our Security Intelligence Report, the series investigates why the same countries and regions consistently pop up as having relatively low malware infection rates, as normalized using a metric calledComputers Cleaned per Mille (CCM).
The series is available in the following articles:
What was commonly found in these locations that have low malware infection rates includes the following:
  1. A strong relationship between public and private entities that led to efficient and proactive responses to malware threats
  2. The presence of CERTs, ISPs, and other entities that monitor malware that enable rapid response
  3. An intelligent and well-trained IT culture where system administrators are able to sufficiently respond to threats
  4. The establishment of policies and processes to quarantine infected computers and prevent malware from spreading across networks
  5. Education campaigns and media participation that raise awareness of security issues
  6. Low software piracy rates and timely and widespread use of Windows Update and Microsoft Update
A big thank you to Tim and the TwC, who collated all this information to help us understand what certain countries and regions are doing right regarding keeping malware away. We strongly encourage users to employ the best practices found in the countries that have these low malware infection rates.
- MMPC

Weblink:

Make ur xp talking



it is easy to make win xp takling
just open notepad
then
copy the this..

Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoic
e")
sapi.Speak msg


and save it .vbs extension
then run the file
enter the text then
its
done
its really cool
leave comments



Tuesday, August 23, 2011

Google Gravity

Go to the following link,

Keep mouse pointer in the website.


Click and drag each parts, throw it up.... how is it????

Monday, August 22, 2011

Microsoft SQL Server Code Name “Denali” CTP3


SQL Server Code Name "Denali" Community Technology Preview (CTP3) provides the foundation to the cloud-ready information platform and will help customers unlock breakthrough insights across the organization and quickly build solutions that extend data across on-premises and public cloud backed by capabilities for mission critical confidence.
  • Deliver required uptime and data protection with AlwaysOn
  • Gain breakthrough & predictable performance with Project Apollo
  • Help enable security and compliance with new User-defined Roles and Default Schema for Groups
  • Rapid data discovery with Project Crescent
  • Deliver credible, consistent data with SSIS improvements, a Master Data Services add-in for Excel, and new Data Quality Services
  • Optimize IT and developer productivity across server and cloud with Data-tier Application Component (DAC) parity with SQL Azure and SQL Server Developer Tools code name "Juneau" for a unified dev experience across database, BI, and cloud functions

LINK: