Monthly Archives: May 2009


Who Should be the New Federal Cyber Czar?

Posted on by Mary Brown

President Obama announced today his plans to appoint a cyber security czar who will be responsible for coordinating efforts to secure information assets and critical infrastructure.  There are a number of efforts going on in congressional committees, all of which … Continue reading

Posted in Current Topics | | 1 Comment

Cloud Computing Security

Posted on by Mary Brown

I attended a security conference recently, where the consensus seemed to be that cloud computing is here to stay. This is despite the fact that most organizations do not truly understand the implications of storing their data over the Internet … Continue reading

Posted in Current Topics | | 1 Comment

Agricultural Crime and Safety?

Posted on by Dr. Steven Brown

When discussing security, we normally think of things like policies, hacking, terrorism, etc.  But the same attention is not given to our food supply. Why?

Posted in Current Topics | | Leave a comment

Web 2.0 Social Networking Security and Privacy

Posted on by Mary Brown

Social networking tools have seen a fair amount of press lately to the ways in which hackers use these tools to commit crimes.  PC Advisor reports a French hacker that gained administrative control of Twitter by compromising the account of … Continue reading

Posted in Current Topics | | Leave a comment

Security Policy Development

Posted on by Steven Helwig

Organizations, regardless of the type of business, are required to meet many regulations and laws .  This can be expensive and strenuous on an organization’s resources.  There are physical, technical and policy type controls that must be met in complying … Continue reading

Posted in Current Topics | | 3 Comments

Ear Noise as Authentication?

Posted on by Mary Brown

I read an article that Paul Marks wrote recently about Dr. Stephen Beeby, an engineer at the University of Southampton, UK. Evidently, Dr. Beeby has received funding to continue his research on using ear-generated sounds, as a form of authentication. … Continue reading

Posted in Current Topics, Security | | Leave a comment