article thumbnail

MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’

The Last Watchdog

Screenshot In a huge development, Microsoft announced today that it is revising its security practices, organizational structure, and, most importantly, its executive compensation in an attempt to shore up major security issues with its flagship product, not to mention quell rising pressure from regulators and customers.

Security 100
article thumbnail

Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). On March 7, 2018, the U.S. It already passed the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: Security Compass leverages automation to weave security deeper into SecOps

The Last Watchdog

In this heady environment, the idea of attempting to infuse a dollop of security into new software products — from inception — seems almost quaint. History of product security. As a nod to security, nominal static analysis and maybe a bit of penetration testing gets done just prior to meeting a tight deployment deadline.

Security 183
article thumbnail

International Criminal Court hit with a cyber attack

Security Affairs

It was established by the Rome Statute, which entered into force on July 1, 2002. Immediate measures were adopted to respond to this cyber security incident and to mitigate its impact. Additional response and security measures are now ongoing, with the assistance of the Host Country authorities.

article thumbnail

NIST proposes Secure Software Development Framework

DXC Technology

Ever since Bill Gates fired off his famous Trustworthy Computing memo in January 2002, developing secure software has been a hot topic of discussion. It was important before then, for sure, but it was often overlooked. It took a series of high-profile worms such as Code Red and Nimda and a series of breaches to […].

article thumbnail

The attack on the International Criminal Court was targeted and sophisticated

Security Affairs

It was established by the Rome Statute, which entered into force on July 1, 2002. The Dutch law enforcement authorities are still investigating the security breach. “The Court is also accelerating a number of existing initiatives aimed at enhancing digital security.” ” concludes the press release.

article thumbnail

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Related: The role of PKI is securing digital transformation That was in 2002. I recently had a chance to have a rich discussion about the state of cybersecurity with Stiennon, the occasion being him sending me a copy of his new book: Security Yearbook 2020: A History and Directory of the IT Security Industry.