Menu

Blogs

Showing Blog Posts: 1–10 of 20 by Robert Moskowitz

Robert Moskowitz

New Mobility Partnerships

  • Infrastructure Protection: Plans and Strategies

    by Robert Moskowitz on January 12, 2015

    Modern organizations run on information, and information runs on infrastructure. Protecting that information infrastructure is vital to the organization’s health. Accomplishing effective infrastructure protection requires a broadly coordinated approach. This approach establishes priorities, sets operational goals, and details both human and technological requirements for reducing vulnerability, …

  • N-DEx: Law Enforcement Security Standards

    by Robert Moskowitz on January 5, 2015

    The U.S. government launched a major law enforcement project, the National Data Exchange (N-DEx), in March 2008 to facilitate cases, criminal information, and available evidence among cooperating agencies. It's 2014, and the project is languishing. N-DEx was designed as an information repository that federal, state, and local law enforcement could tap for a variety of purposes, with the basic idea…

  • Security Infrastructure: Homeland Security

    by Robert Moskowitz on December 31, 2014

    As part of its mission to protect US infrastructure, the Department of Homeland Security develops and deploys an array of security infrastructure systems designed to assess, ferret out, and thwart as many real-world risks as possible. The Department must keep American infrastructure secure and resilient enough to withstand and recover from all conceivable dangers. DHS focuses on infrastructure…

  • Cybercrime: The Computer Hacking Persona Debunked

    by Robert Moskowitz on December 29, 2014

    Popular media is filled with stories of computer hackers —young, male, nerdy college dropouts who are not very social—and their hacking activities. However, reports show that hackers are actually a wild and crazy bunch and far more diverse than most people suspect. They are quite social in certain settings. What's more, within these social circles, advanced knowledge of computers and software…

  • Network Intrusion: Methods of Attack

    by Robert Moskowitz on December 25, 2014

    A network intrusion is any unauthorized activity on a computer network. Detecting an intrusion depends on the defenders having a clear understanding of how attacks work. In most cases, such unwanted activity absorbs network resources intended for other uses, and nearly always threatens the security of the network and/or its data. Properly designing and deploying a network intrusion detection…

  • Guidelines for Mobile Computing Security

    by Robert Moskowitz on December 15, 2014

    Mobililty is clearly the future of computing. Smartphones and tablets are more powerful and bring-your-own device is an accepted reality. This raises major security issues, as mobile computing can be readily compromised at the device, network and wireless connectivity levels. The mobile device itself—whether a portable computer, personal digital assistant, laptop, smartphone, tablet computer, or…

  • Latest Guidelines for Malware Detection

    by Robert Moskowitz on November 28, 2014

    Today's malware brings a wide range of threats that—without proper detection and defense—can wreak havoc on any computer system. While various kinds of malware can get onto your system via the original manufacturer, information-seeking government agencies, and covert infiltrators, the vast majority of malware still comes over the Internet as software downloads. Deceptive Downloads Because a…

  • Network Intrusion: NIDS and Detection

    by Robert Moskowitz on November 24, 2014

    Network intrusions—any unauthorized activity on a computer network—utilize network resources that can be better used for other, authorized, purposes. They threaten the security of the network and data. There are a variety of ways to detect an intrusion, including monitoring network logs, sniffing network traffic, and real-time filtering for specific network events. At a minimum, network security…

  • Security Infrastructure: What Does It Really Entail?

    by Robert Moskowitz on October 31, 2014

    For years, the goal behind security infrastructure has been to thwart—or at least, mitigate—malicious attacks against an organization's secure data. But in today's world of interconnected computer systems and new generation of information technology capabilities, this old-style infrastructure is no longer capable of guaranteeing privacy for sensitive data. Modern industry needs requires features…

  • A Whole New Way to Spot Malware Before It Spots You

    by Robert Moskowitz on October 28, 2014

    Enterprise networks still rely on antivirus software and blacklists to keep known malware at arm's length. But researchers suggest another approach, one which promises to spot a dangerous piece of code before it shows up on a list somewhere. This form of detection doesn't look for malicious code, but for malicious networks communicating with that code. Internet service providers, and any…

This document was retrieved from http://www.rsaconference.com/blogs/by/114/moskowitz on Tue, 27 Jan 2015 13:55:01 -0500.
© 2015 EMC Corporation. All rights reserved.