[note: the links are no longer active, apologies] In this example, the press takes advantage of recent comments about a “cyber Pearl Harbor” and implies that what looks like a case of identity theft for the purposes of tax and credit card fraud is an international cyber attack on the U.S. by our enemies. The press release … Continue reading
Monthly Archives: October 2012
Tellers of tales and Debunkers of myths
An organization needs both. You need someone who can “weave a yarn”, “tell a tale”, “paint a picture with words”, etc. But you also need someone who “lets” facts get in the way of those myths. Marketing and sales folks need to be tellers of tales. And this does not mean they need to be … Continue reading
US Privacy Law chaos
Dr. Solove illulstrates the core of the problem. http://www.linkedin.com/today/post/article/20121024165918-2259773-the-chaos-of-us-privacy-law Continue reading
SWAT Teams, Power Rangers and Nerds with an edge
As you work in the Information Security field, you realize you can classify your peers into three groups. I guess the title gives away what they are. But it is true. You have the mil-intel-nation-state-attack-vector types. They think of Information Security as an extension of warfare in virtual space. They are often very strong on … Continue reading
Been a lot of places and I’m going to be from here
Things that are true are often heard too much and we become “immune” to them. Other things are true but not heard often enough. This is especially true at Info Security conferences. My list (add yours, please): Heard too often Not heard often enough You need to have an information security policy Control testing should … Continue reading
Encryption & efficiency
A link about encryption from Bruce Schneier’s latest Cryptogram. A useful scheme with current business application. What is noteworthy is that the article mentions that the solution is not yet efficient for business use. But no metrics are provided. It is common that security is resisted with phrases like “inefficient”, “negative user impact” and ” … Continue reading
Identity Management in Health Care
Is all risk worth insuring?
Mark Rasch reminds us of the answer: risk is worth insuring when you and the insurer agree on what is being covered. http://storefrontbacktalk.com/securityfraud/the-legal-perils-of-cyber-insurance-for-retailers/ Continue reading
Visibility v. Privacy
Cousin Jesse quoted in this recent article about Facebook settings. Speaks for itself: http://mbcalyn.com/2012/06/27/on-facebook-the-semantics-of-visibility-vs-privacy-nytimes-com/ Continue reading
Got your Cyber Security Right Here
keep reading Continue reading