Why Remote Wipe is Dumb: Part II
OK. Let’s assume for a minute that remote wipe is on your checklist when you go shopping for a mobile security solution. You are looking for peace of mind when a mobile device gets lost or stolen or...
View ArticleInformation Security in 2020: Part I
“Just because everything is different doesn’t mean anything has changed.” The principles that motivate current approaches to securing information and the systems that store, process, & transmit...
View ArticleInformation Security in 2020: Part II
In our last post we asked a simple question: Why do data breaches still occur? In order to begin to answer this question, we need to start by looking at the state of the contemporary security scene –...
View ArticleInformation Security in 2020: Part III – Crypto
Cryptography underlies the provision of security for just about every kind of contemporary communications network, and I believe that this is unlikely to change soon; although, as we have seen...
View ArticleInformation Security & Steamboat Boiler Explosions
In the U.S., safety & security almost always takes a back seat behind commerce. This historical principle is in evidence in almost any field: numerous (unfortunately) examples of this have been...
View ArticleThe Enemy: Cyber Criminals, Cyber Warriors, Hackers, & Punks
The Enemy: Cyber Criminals The list of categories of cyber crime is growing, & is, for the most part, advancing in lockstep w/ technology advances. Some of these crimes overlap, but a...
View ArticleAlmost Thirty Years after 1984 – Part 1
O wonder! How many goodly creatures are there here! How beauteous mankind is! O brave new world, That has such people in’t. —William Shakespeare, The Tempest, Act V, Scene I, ll. 203–206 Thinking...
View ArticleCloud Service Models & Security – A Primer
The various kinds of services that cloud computing platforms provide are typically lumped together into three categories called service models: Infrastructure as a Service (IaaS) In the IaaS service...
View ArticleThe High Level Process of FISMA Certification
Inventory of information systems: An inventory of information systems is required by FISMA for federal agencies. Individual computers managed by the same system owner with a common purpose can be...
View ArticleFISMA Certification and Accreditation
FISMA defines a framework for managing information security that must be followed for all information systems used or operated by a U.S. federal government agency in the executive or legislative...
View Article
More Pages to Explore .....