Wednesday, August 30, 2006

Intel's CIA (not a CEO) officer boosts new security architecture worldwide


An Intel Corp. executive and cyber security strategist has been tapped to head the CIA's investment and research arm.
So, Intel's CIA (not a CEO) officer boosts new, secure micro architecture worldwide.
Exactly on the CIA field of operation, and that is by the definition - worldwide.
Intel is sometime under direct control of Jewish state Israel. All new architecture designs are located in Israel. Their names are Jewish. And finally, Intel's current investment in manufacturing plans are solely concentrated on Israel. So, why shouldn't CIA operatives in Intel management be revealed to publicity? And that is what exactly has been done today.
Now, when CIA give to your government offer to buy say some new Intel architecture chips, think twice before you refuse. Salvador Allende refused such an CIA offer that can't be refused, and hmm, he was soon after that shut down. Thus, we got a nice way for rise of Intel's future market share. ! With garanted CIA enabled security hole INSIDE the Intel chips , for future anti terrorism needs only (of course). At least in the parts of Intel's XML middleware software products, where he have had access, as Intel's vice president.

And, in the book The Myth of Secure Computing, InQtel new president finds:
Few senior executives pay much attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all.

Congrats to all Intel customers. You are now on, more than 90% secure!.
Oh b..t, now all customers have Mr. Darby name and the picture. What a hardware, such a cyber security.

Comments: Post a Comment



<< Home

This page is powered by Blogger. Isn't yours?