President Obama announced today his plans to appoint a cyber security czar who will be responsible for coordinating efforts to secure information assets and critical infrastructure. There are a number of efforts going on in congressional committees, all of which … Continue reading
Monthly Archives: May 2009
I attended a security conference recently, where the consensus seemed to be that cloud computing is here to stay. This is despite the fact that most organizations do not truly understand the implications of storing their data over the Internet … Continue reading
When discussing security, we normally think of things like policies, hacking, terrorism, etc. But the same attention is not given to our food supply. Why?
Social networking tools have seen a fair amount of press lately to the ways in which hackers use these tools to commit crimes. PC Advisor reports a French hacker that gained administrative control of Twitter by compromising the account of … Continue reading
Organizations, regardless of the type of business, are required to meet many regulations and laws . This can be expensive and strenuous on an organization’s resources. There are physical, technical and policy type controls that must be met in complying … Continue reading
I read an article that Paul Marks wrote recently about Dr. Stephen Beeby, an engineer at the University of Southampton, UK. Evidently, Dr. Beeby has received funding to continue his research on using ear-generated sounds, as a form of authentication. … Continue reading