As an AFCEAN myself, I can attest to the value of attending AFCEA East. I’m especially excited to be participating at this year’s conference, with its first-rate line-up of keynote speakers, panel sessions, and other opportunities for learning and sharing with colleagues.
While Chinese cyber espionage tends to grab the headlines, I was initially drawn to a different statistic in the DBIR: 92% of breaches are perpetuated by outsiders, who mostly rely on unsophisticated attack methods, and go largely undetected for months. Weak, stolen and compromised passwords are the “weak locking mechanism at the front door.”
High school students don’t fully realize the value of getting an early start in computer programming, and many schools don’t have the tools or resources to showcase how beneficial the skill of computer programming would be for their students. So what can be done to get kids involved in Computer Science? Enter TEALS -- Technology Education And Literacy in Schools.
As development contracts come up for renewal, SwA requirements in the acquisition phase will continue to grow – provided the right people have learned of its importance. Let’s all hope this trend continues, because finding and remediating vulnerabilities during development is far more secure and efficient than once it’s deployed and it’s too late.
Software applications come in all sizes -- from small embedded systems to large-scale enterprise systems. There are no hard rules or silver bullets regarding what security concerns should be considered for an application, but the following secure design principles can help guide architects and designers alike.
Next week I’ll be heading to Chicago for the 2013 Spring Conference, offered by Airport Law Enforcement Agencies Network (ALEAN). Having worked with and supported ALEAN since 1999, I’m looking forward to seeing old friends and colleagues and making new ones.