Security Postures: Time to start pedaling faster
Back in my misspent youth, us kids used to ride our bikes as fast as we possibly could, trying to leave group members behind. The slowpokes invariably whined… “Hey!”… “Wait up!”… and if we could...
View ArticleMassachusetts and Breach: Yielding a Comprehensive Understanding of Risk
According to the Massachusetts state attorney general’s office, approximately 2 million residents have had their personal information compromised just in the past 20 months. Electronic data breaches,...
View ArticleSecurity Expert Eugene Kaspersky Warns of Cyber-Terror
Today, any organization is dead without its technical supports. Even an attack on content – information, business intelligence, data – can put business at risk. By “business,” we mean the doing...
View ArticleCyber-terror, Hacktivism, etc.: New thoughts on security for the modern...
The Washington Post is reporting that foreign hackers disabled a pump at an Illinois water plant last week, according to the preliminary state report. If the source of the attack is confirmed as...
View ArticleCyber Crime to Invade Public Cloud… and more…
Well, I guess it already has. But an interesting opinion was rendered recently regarding the United States’ position regarding cyber crime. According to Trend Micro’s global CTO, Raimund Genes,...
View ArticlePC Magazine’s “The 25 Worst Passwords of 2011”
We’ve discussed password liabilities before: Consider that many people use the same password (and often User ID) for multiple accounts. This can include online bank credentials, work accounts,...
View ArticleLeveraging Knowledge Requires… Knowledge
Leaders must have the skill to recognize skills in others. The IT field, like any, is rife with people who talk a good game. Some walk like they talk – some don’t. The average candidate for your...
View ArticleHackers are Hitting Macs with a Major Virus
Word comes that more than 500,000 Macintosh machines are potentially infected with a virus – one that is specifically targeting Macs: It’s called Flashback Trojan. The virus is a variation on one...
View ArticleCrucial Considerations when Going Mobile, Pt. IV – Security
Security is of prime concern in the mobile environment. IT security in any realm involves logical security and physical security. Logical security is the integrity of data (content), precision of...
View Article94 MILLION Personal Files Exposed: Sobering Statistics Regarding Data Breach
According to security firm Rapid 7, approximately 94 million personal files of Americans have been exposed by government agencies since 2009 – those that we know about, that is. There are likely even...
View Article
More Pages to Explore .....