Weekly Roundup: May 4, 2012 – Think Before You Click

Trending Security News

Security news stories this week continue to validate the importance of cybersecurity skills in the marketplace and FEMA released a new National Preparedness Report providing insights on the state of national critical infrastructure protection. Here are some of the security news stories and a blog pick this week.

In the News

Hottest IT Skill? Cybersecurity – PCWorld
Cyber security is hottest IT skill – InfoWorld
Microsoft Security Essentials 4.0 – PC Magazine

Security Research & Intelligence

FEMA: Cybersecurity ranks lowest among critical protections – Government Computer News
FEMA National Preparedness Report

Cyber Threat

Cybersecurity Roundup: Tech Firms Waver on CISPA; Android Malware; and More – CIO
Hackers have breached top secret MoD systems, cyber-security chief admits – The Guardian
‘Smishing’ Attacks Are on the Rise – Networkworld
Coming Up With Better Ways to Count — and Counter — Botnets  – Threat Post

Government, Legislation & Policy

Army contracts help for cybersecurity – UPI
SOCA website brought down by DDoS cyber attack – for second time in a year – Naked Security
US to legislate protecting Facebook passwords from employers  – infosecurity

Blog Picks

Microsoft to Botmasters: Abandon Your Inboxes – Krebs on Security

Microsoft Research, Papers and Media

Trustworthy Computing Next (paper)

Cybersecurity/Internet Health

· Rethinking the Cyber Threat (paper)

· Collective Defense: Applying Public Health Models to the Internet (paper)

· Video: Collective Defense: Enabling Healthy Devices (video)

Security Intelligence

· Lessons from Least Malware Infected Countries (series)

· Battling the ZBot Threat (paper)

Trustworthy Computing

· Imagine Video: Microsoft Trustworthy Computing (video)

Cybersecurity/Trusted Supply Chain:

· Supply Chain Risk Management keynote at the East-West Institute’s Second Worldwide Cybersecurity Summit (video)

· Cyber Supply Chain Risk Management: Toward a Global Vision of Transparency and Trust (paper)

· Toward a Trusted Supply Chain: A Risk Based Approach To Managing Software Integrity (paper)

· Microsoft at RSA Conference 2012

· Microsoft Sessions at RSA Conference 2012

· Trust in Computing Research

· TwC Next Poster

About the Author