by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : July 15, 2013
The classi ed information leaked to media outlets by former National Secu- rity Agency contract employee Edward Snowden was smuggled out of an NSA facility using a thumb drive, according to a report in the Los Angeles Times. If it can happen at NSA, which pro- hibits ash drives and uses a bevy of digital and physical security measures to prevent information from leaving its networks, what does that mean for other agencies? In general, federal agencies and contractors can use only thumb drives that adhere to FIPS 140-2. But even the most stringent standards cannot stand up to someone who is not forced to adhere to them. A.N. Ananth, CEO of EventTracker, said the signs point to Snowden being trusted a little too much. His job as a systems administrator might have allowed him to use thumb drives, but it appears nobody was watching him. "The insider threat is difficult to guard against," Ananth said, "and more than the technology, it appears that oversight was absent." The tools and policies exist to give organizations the best chance at pre- venting data leaks or theft, he said, but most lack the discipline to implement them fully. "The government wrote the book on a lot of this stuff," he said. "But somehow the house is disorga- nized, and agencies are going to need to have discipline to clean it up." --- Frank Konkel July 15, 2013 FCW.COM 9 Join the conversation FCW uses Twitter to break news, eld questions and ask our own. Learn more at FCW.com/followFCWnow. Kudos - @Wired credits @FCWnow's @Frank_Konkel for breaking the CIA cloud computing story http://shrd.by/otmywb 8:30AM-20Jun13 cdorobek @cdorobek Reply Retweet Favorite INFRASTRUCTURE SECURITY Special Report SPONSORED BY: CDW-G and Symantec TOPICS INCLUDE: NEW CYBER THREATS DEMAND NEW CYBER SOLUTIONS BUDGET SCRUTINY UPS ANTE FOR CYBERSECURITY PLANNING AGENCIES URGED TO STRENGTHEN RISK MANAGEMENT EFFORTS CONTINUOUS MONITORING: DON'T TAKE IT LIGHTLY WORKFORCE TRAINING SEEN AS KEY TO CYBER SUCCESS TO LEARN MORE, VISIT: FCW.COM/2013INFRASTRUCTURESECURITY of the roughly 350 agency political jobs requiring Senate con rmation were vacant as of May 10, a pending CRS report states 92 What Snowden's thumb-drive stash means for feds
June 30, 2013
July 30, 2013