US Police use games consoles in crime investigations
Police in the US use XBox 360 and PS3s as key parts of investigations. With police now cooperating more closely with companies like Microsoft, is it time to ask for greater transparency about their...
View ArticleDo Security Maturity Models Work?
Could the addition of a new maturity model to the Nation’s Electrical Grid System improve security and protect the grid from cyber threats? An article at InfosecIsland.com a few weeks ago discussed a...
View ArticleShould Security Companies Be Held to Higher Standard?
It would be funny if it weren't so serious -- Symantec is urging customers to disable its pcAnywhere remote control software because it lost the source code to hackers back in 2006 and never made...
View ArticleFinal Phase Of Massachusetts Data Protection Law To Kick In On March 1
All companies storing personal data on Massachusetts residents have just over a month to ensure that their contractors, suppliers, technology providers and other third parties comply with a provision...
View ArticleGoogle Scores A+ with new Privacy Policy
Google has set an example by being transparent in how it manages the privacy of personal information it collects from the use of its services. There is hue and cry over some aspects of its disclosures...
View ArticleRedesigning Security Strategy to Protect the Navigation Layer
In a recent conversation with Fahmida Rashid, senior writer at eWeek, the concept of the Navigation Layer and how companies can begin to secure this layer of the Web was of particular interest. I...
View ArticleMr. Waledac: The Peter North of Spamming
Microsoft on Monday named a Russian man as allegedly responsible for running the Kelihos botnet, a spam engine that infected an estimated 40,000 PCs. But closely held data seized from a huge spam...
View ArticleCloud Fundamentals Video Series: Benchmarks and Evaluation Standards for...
Posted by: Tim Rains, Director, Trustworthy Computing Benchmarks and evaluation standards for cloud computing security is a topic that is top of mind for many organizations that are evaluating the...
View ArticleMaster the Cloud, Montréal – Notes from the road…
Bonjour de Montréal mes amis! The sun is shining today in the beautiful and historic town where the temperature is frigid, but the Habs and Cloud Computing are heating up the city. After sitting...
View ArticleNew EU Data Protection Rules Proposed
Differences in interpretation of the EU's 1995 data protection rules may soon be resolved, according to a proposal by Viviane Reding, Vice-President of the EC in charge of Justice, Fundamental Rights...
View ArticleHas BDUK retained Pinsent Mason to do the impossible as well as unnecessary?
I am told that BDUK engaged Pinsent Mason to write an umbrella state aid exemption for the entire UK. This is unlikely to be in place (assuming it is approved which is unlikely) before the Summer....
View ArticleCounter Terror Expo US Forms Advisory Board to Expand Community Reach and...
The Counter Terror Expo US , being held May 16-17, 2012 at the Walter E. Washington Convention Center , has formed an advisory board of industry experts from leading organizations to help guide and...
View ArticlePure Cash with PureCloud
Calling all IT solution Providers, resellers and online communities! nCircle recently announced PureCloud our revolutionary new, cloud-based scanning service and it's been pulling in rave reviews from...
View ArticleCuckoo for Cuckoo Box
Cuckoo Sandbox is an automated, open source, malware analysis system that started as a Google Summer of Code project in 2010 and recently released version 0.3 in December of 2011. I am a big fan of the...
View ArticleHow to Quickly Create New Habits in Your Life
A friend of mine mentioned that she was having trouble getting in the habit of going to the gym every morning, so I promised an explanation of how I have created so many beneficial habits in my life in...
View ArticleJudge Rules Computer Files, Even Those Self-Incriminating, Must Be Decrypted
In a ruling that limits the protections granted to U.S. citizens under the Fifth Amendment, the U.S. District Court for the District of Colorado ordered the defendant in a case involving mortgage fraud...
View ArticleGet pcAnywhere Off Your Network Now
Yesterday Symantec issued a security advisory for users of pcAnywhere asking users of the product to delete or disable it immediately until they release a set of updates that resolve currently known...
View ArticleWith Cloud, The PaaSibilities Are Endless…
I read a very interesting article from ZDNet UK this morning titled “Amazon Cuts Off Stack at the PaaS” The gist of the article is that according to Werner Vogels (@werner,) AWS’ CTO, they have no...
View Article