Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 20 November 2009

Security & Secrecy

Posted on 11:01 by Unknown

by Michael Smith (Veshengro)

Two of information security's best known experts, John Colley and Howard Schmidt, said during the RSA Europe Conference in London that cloud computing could provide government with the chance to make significant improvements to protecting data.

However, Colley added that it would help if the government's information security specialist, CESG - the information assurance arm of GCHQ - got involved with the work.
It is only a few years since GCHQ's offices in Cheltenham were actually added to Ordnance Survey's maps. Prior to that they acted as if they did not exist. Much in the same way as the government kept denying for so long that MI5 and especially MI6 even existed.

But government infosecurity is now a vital part of the work of the GCHQ, with CESG certifying products and services as fit for state sector use. It now even has online maps to help you find its offices.
However, CESG remains linked to the secretive world of surveillance. Among infosecurity experts, the UK government has a decent reputation for protecting its most sensitive information, its secrets.

The problem is, thought, that the British government has a terrible reputation for protecting its citizens' data, along with its surveillance state approach to harvesting it.

Having said that, however, Germany is beginning to lead the field in Europe in the data mining from its citizens and we can but hope that that is not a sign of things to come.

It would appear though as if Germany, on the other hand, seems to be better in protecting people's data and does not seem to be losing all that many CDs and USB sticks with sensitive unencrypted data on it as do British government agencies.

I mean, come on, for the lack of a £30 AES 256 hardware encrypted – and some of them are still cheaper nowadays – an entire intelligence network got compromised because some idiot left an flash drive on a railway station in Colombia.

When a secret agent and its agency are that stupid then what hope is there and while the country is over secret and also thinks it has to have all that information on its citizens those protected with safeguarding that information – not that they should data mine such information from the pubic in the first place – could not be trusted with monopoly money.
Government information security has to continue to improve if public trust in state sector data handling is ever to recover. Maybe it time for CESG to leave Cheltenham and GCHQ, and seek a higher profile for its important work.

GCHQ has never been very good in securing its secrets either and I well remember the fiasco some years back when they sold surplus PCs – we are talking before the Internet – with the hard drives – then in the region of 40MB – yes there was a time when we thought that was more than we would ever need – not wiped and very sensitive data on them. Not much has changed, eh?

© 2009

<>

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ▼  2009 (240)
    • ►  December (25)
    • ▼  November (9)
      • Security concerns influence organizational enthusi...
      • With UK Climate Research Unit is hacked experts sa...
      • Security & Secrecy
      • Storage Expo Evolves in 2010 into 360°IT
      • Yahoo jobs website hack
      • Kingston Digital Releases New Multifunctional Flas...
      • SSD vs HDD
      • AES256 secure USB disk U256 from Netac/Weast – Pro...
      • Win7 vulnerability to viruses highlights modern co...
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile