Aspectos Legales de las Tecnologías de Información
4.6K views | +0 today
Follow
Aspectos Legales de las Tecnologías de Información
Noticias y artículos sobre derecho y tecnologías de información. Puedes llegar rápidamente mediante el link: http://noticias.alti.mx
Your new post is loading...
Your new post is loading...
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Grandes robos informáticos de la historia

Grandes robos informáticos de la historia | Aspectos Legales de las Tecnologías de Información | Scoop.it

“El único sistema verdaderamente protegido es aquél que está apagado, encerrado en un bloque de hormigón y sellado en una habitación forrada de plomo con guardias armados - y aún así tengo mis dudas ”. Corría el año 1989 cuando el profesor y reputado experto en seguridad informática Gene Spafford realizó esta llamativa reflexión.

Joel Gómez Treviño (@JoelGomezMX)'s insight:

Buena recopilación de casos de ciberdelincuencia de las últimas décadas.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

La CIA revisa las redes sociales a nivel global

La CIA revisa las redes sociales a nivel global | Aspectos Legales de las Tecnologías de Información | Scoop.it

Analistas de la CIA se autodenominan jocosamente como los "bibliotecarios ninja"; revisan una gran cantidad de información que la gente publica sobre sí en el exterior, rastreando de todo, desde la opinión pública hasta revoluciones. El esfuerzo del grupo da a la Casa Blanca una instantánea diaria del mundo con base en tuits, artículos de periódicos y actualizaciones en Facebook. El Centro de Fuentes Populares revisa 5 millones de tuits por día.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Here's The U.S. Government Report That Openly Calls Out China On Economic Cyberspying

Here's The U.S. Government Report That Openly Calls Out China On Economic Cyberspying | Aspectos Legales de las Tecnologías de Información | Scoop.it

Since Google revealed in January of 2010 that its systems had been penetrated by China-based hackers, the phenomenon of Chinese cyberspying has been an open secret, widely discussed by the cybersecurity community but rarely mentioned by U.S. government officials for fear of diplomatic repercussions. Late this week, a combined group of 14 U.S. intelligence agencies finally released in a report what’s already been received wisdom in many private sector and government circles for years: That “Chinese actors are the world’s most active and persistent perpetrators of economic espionage,” and that the use of digital spying tools ”is already a larger threat than more traditional espionage methods.”

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

US seeks stronger cyber defenses for small biz

US seeks stronger cyber defenses for small biz | Aspectos Legales de las Tecnologías de Información | Scoop.it

The US government is making it easier for small businesses to beef up defenses against cyber criminals through a free, online tool, the top US communications regulator said on Monday. The Small Biz Cyber Planner will allow business owners to create customized cybersecurity plans by answering basic questions about their company and its online presence.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

SANS: 20 Critical Security Controls

SANS: 20 Critical Security Controls | Aspectos Legales de las Tecnologías de Información | Scoop.it

Twenty critical security controls for effective cyber defense and audit guidelines courtesy of the SANS Institute. The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Departing Pentagon Official Warns Against Cutting Cybersecurity Funding

Departing Pentagon Official Warns Against Cutting Cybersecurity Funding | Aspectos Legales de las Tecnologías de Información | Scoop.it

If Congress fails to broker a deficit-reduction deal, the Pentagon will be forced to halt informationp-technology upgrades and shrink military forces, but still will have to boost funding for cybersecurity, warns outgoing Deputy Defense Secretary. Pentagon must be prepared for a possible cyberbattle, even during very austere times.

more...
No comment yet.
Rescooped by Joel Gómez Treviño (@JoelGomezMX) from Information Cyber Corps
Scoop.it!

Top US firms open to voluntary cybersecurity rules: Senate

Top US firms open to voluntary cybersecurity rules: Senate | Aspectos Legales de las Tecnologías de Información | Scoop.it

Many Fortune 500 companies support the creation of federal cybersecurity standards to protect them from Internet threats like hacking as long as they are voluntary, according to a Senate survey of top U.S. chief executives released on Wednesday. Better protection from cyber threats has taken on growing urgency in Washington, with top officials warning of the potentially devastating impact of cyber attacks that could undermine key infrastructure, which is mostly privately owned.


Via Jeff Makana
Joel Gómez Treviño (@JoelGomezMX)'s insight:

Ojalá algo como esto sucediera en México. La ciberseguridad es responsabilidad de todos.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

U.S. and EU partner for security response exercise: CyberAtlantic 2011

U.S. and EU partner for security response exercise: CyberAtlantic 2011 | Aspectos Legales de las Tecnologías de Información | Scoop.it

U.S. government agencies and members of the European Union (EU) on Thursday teamed up for a daylong exercise aimed at clarifying how to best communicate about cyber incidents. During the first-of-its-kind exercise, called “Cyber Atlantic 2011,” participants from the U.S. Homeland Security and Justice departments, and more than 20 EU member states were presented with two hypothetical cyberattack scenarios. Cyber Atlantic 2011 aimed to clarify how the two nations can best communicate about cyber incidents that occur on government systems or critical infrastructure.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Inside Facebook's massive cyber-security system: FIS

Inside Facebook's massive cyber-security system: FIS | Aspectos Legales de las Tecnologías de Información | Scoop.it

Known as the Facebook Immune System (FIS), the massive defence network appears to be successful: numbers released by the company this week show that less than 1 per cent of users experience spam. It took just three years for FIS to evolve from basic beginnings into an all-seeing set of algorithms that monitors every photo posted to the network, every status update– indeed, every click made by every one of the 800 million users. There are more than 25 billion of these "read and write actions" every day. At peak activity the system checks 650,000 actions a second.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Cybersecurity: Protecting the digital economy

Cybersecurity: Protecting the digital economy | Aspectos Legales de las Tecnologías de Información | Scoop.it

As hackers continue to outwit governments, policymakers are playing catch up: More agencies, stronger protections of data and simulated cyber attacks are all part of an upcoming artillery against cyber attacks. Online security cannot be taken for granted as hackers and cyber attackers continue to outdo software engineers. Currently there are a handful of ways to secure data like hardware backups, server backups, remote security controls, filtering, encryption and many more.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

White House Orders New Computer Security Rules

White House Orders New Computer Security Rules | Aspectos Legales de las Tecnologías de Información | Scoop.it

After a review of policies that led to the WikiLeaks document disclosures, the White House plans to issue an executive order to set new rules on handling classified information.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Cybersecurity Task Force Releases Recommendations

Cybersecurity Task Force Releases Recommendations | Aspectos Legales de las Tecnologías de Información | Scoop.it

The House Cybersecurity Task Force today unveiled its recommendations to help guide legislative action for the remainder of this Congress and beyond. Cybersecurity attacks are a direct threat to our economy and job creation, as well as our national security. The task force has addressed this critical issue in a thoughtful and substantive way.

more...
No comment yet.