Quantcast
Channel: Battle Magic Security » tporter56
Browsing latest articles
Browse All 10 View Live

Why Remote Wipe is Dumb: Part II

OK. Let’s assume for a minute that remote wipe is on your checklist when you go shopping for a mobile security solution. You are looking for peace of mind when a mobile device gets lost or stolen or...

View Article



Information Security in 2020: Part I

“Just because everything is different doesn’t mean anything has changed.”   The principles that motivate current approaches to securing information and the systems that store, process, & transmit...

View Article

Information Security in 2020: Part II

In our last post we asked a simple question: Why do data breaches still occur? In order to begin to answer this question, we need to start by looking at the state of the contemporary security scene –...

View Article

Information Security in 2020: Part III – Crypto

Cryptography underlies the provision of security for just about every kind of contemporary communications network, and I believe that this is unlikely to change soon; although, as we have seen...

View Article

Image may be NSFW.
Clik here to view.

Information Security & Steamboat Boiler Explosions

In the U.S., safety & security almost always takes a back seat behind commerce. This historical principle is in evidence in almost any field: numerous (unfortunately) examples of this have been...

View Article


The Enemy: Cyber Criminals, Cyber Warriors, Hackers, & Punks

The Enemy: Cyber Criminals The list of categories of cyber crime is growing, & is, for the most part, advancing in lockstep w/ technology advances. Some of these crimes overlap, but a...

View Article

Image may be NSFW.
Clik here to view.

Almost Thirty Years after 1984 – Part 1

O wonder! How many goodly creatures are there here! How beauteous mankind is! O brave new world, That has such people in’t. —William Shakespeare, The Tempest, Act V, Scene I, ll. 203–206   Thinking...

View Article

Cloud Service Models & Security – A Primer

The various kinds of services that cloud computing platforms provide are typically lumped together into three categories called service models: Infrastructure as a Service (IaaS) In the IaaS service...

View Article


The High Level Process of FISMA Certification

 Inventory of information systems: An inventory of information systems is required by FISMA for federal agencies. Individual computers managed by the same system owner with a common purpose can be...

View Article


FISMA Certification and Accreditation

FISMA defines a framework for managing information security that must be followed for all information systems used or operated by a U.S. federal government agency in the executive or legislative...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images