Access "An Internet kill switch bill wouldn't ensure security"
This article is part of the April 2011 issue of Successful cloud migrations require careful planning
Some of the most intriguing storylines to emerge from the crisis in Egypt are those related to the attempts by the Egyptian government to control the flow of information in and out of the country. The reaction of the Egyptian government to the social unrest included the disruption of voice and data communications, resulting in what appears to be the first intentional deployment of a "kill switch" -- the intentional shutdown of Internet access -- by a central government as a political tool. Simultaneously, there has been continued debate over the merits of the so-called "Internet kill switch" within the U.S., described by proponents as an important tool to blunt widespread cyberattacks. Despite recent reassurances by policymakers such as Sen. Joseph Lieberman that an Internet kill switch is not in the nation's best interests or immediate future, political winds change quickly. Therefore, the information security industry would be well served by explaining why the concept should be eliminated from discussion about cybersecurity guidance, regulation and policy.... Access >>>
Premium Content for Free.
Application whitelisting: an extra layer of malware defense
by Eric Ogren, Contributor
Application whitelisting was hyped as an antivirus killer. Its real role is serving as an added weapon in the battle against malware.
Key steps for security incident response planning
by Ravila Helen White
Security incidents are going to happen. Don't get caught flat footed.
- Application whitelisting: an extra layer of malware defense by Eric Ogren, Contributor
Antivirus vendors go beyond signature-based antivirus
by Robert Westervelt
Security vendors are adding new capabilities into their products to keep up with the surge in malware.
Cloud migration requires network retooling
by David Newman
Learn what is required for cloud migration, including retooling of network design and security controls such as encryption and DLP.
- Antivirus vendors go beyond signature-based antivirus by Robert Westervelt
An Internet kill switch bill wouldn't ensure security
by Paul Rohmeyer
Giving the president power to shut down the Internet would have devastating consequences.
Information security professionals can't waste this opportunity
by Michael S. Mimoso, Editorial Director
Grab your newfound visibility by the horns and figure out how to bring oversight and direction to cybersecurity.
Marcus Ranum and Gary McGraw talk about software security issues
by Marcus J. Ranum, Contributor
Marcus Ranum and Gary McGraw discuss software security issues in this new bimonthly feature where Marcus Ranum goes one on one with a fellow security industry insider.
- An Internet kill switch bill wouldn't ensure security by Paul Rohmeyer
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...