unix and linux operating commands

Cross Organizational Collaboration - Securing the World with Cooperation


 
Thread Tools Search this Thread
# 1  
Old 10-30-2008
Cross Organizational Collaboration - Securing the World with Cooperation

We just completed an awesome conference in Taipei, so I posted some Comments on Proxy Caches and Web Application Security (OWASP Taipei) on my blog.

Like many of you, we are members of multiple security-related organizations including non-profit, government, military, educational and commercial organizations. I happen to be both an (ISC)² member as well as chapter leader for (the new chapter) OWASP Thailand. Many (ISC)² members serve on myriad IT-security boards as directors and advisors. In addition, various organizations support and sponsor each other; for example, (ISC)² is an OWASP sponsor.

As professionals, it is our responsibility and ethic to positively and proactively support our profession, including other IT-security related organizations. Increasingly, cybersecurity is becoming one of the most challenging global problems we face. Web servers and transactions know no boundaries.

Because of this, our professional responsibility, indeed the core fabric of our ethic, is to offer support and foster cooperation between and across security organizations. Cross organizational collaboration is very important. The only way we can hope to secure the very vulnerable and fragile cyberworld we have created is by the global cooperation of security related organizations and experts.


Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. What is on Your Mind?

Mad World Remix of Moby Video (Are You Lost In The World Like Me)

This is an excellent video comment on modern society and the remix is good too: https://www.youtube.com/watch?v=5DU1B_XkyIk 5DU1B_XkyIk Watch the video above and post your comments. (3 Replies)
Discussion started by: Neo
3 Replies

2. AIX

Securing AIX

Guys, i want to securing AIX after install by scratch. Is anybody can inform about the standard port which used by AIX? (4 Replies)
Discussion started by: michlix
4 Replies

3. Cybersecurity

Securing Passwords

Hi All, I'd like to give you an example of what I am trying to achieve and perhaps you might be able to help me along. I would like to add the following criteria to new servers, from a password aging and lockout standpoint. -Number of failed logins before lockout: = 5 -Number of Passwords... (1 Reply)
Discussion started by: mkono
1 Replies

4. AIX

securing a shell

I would like to secure a shell script from being broken out of with Ctrl-C or equivalent. Once a user logs in, he should not be able to exit to the command prompt. any ideas. Thank you J (1 Reply)
Discussion started by: jhansrod
1 Replies
Login or Register to Ask a Question