The trial of the network administrator who refused to give up the passwords to the network ended with a guilty verdict. What controls were missing in this case that led to the incident in the first place? Who do you … Continue reading
Monthly Archives: April 2010
Capella Learner, Keith Asante, recently completed his dissertation entitled: Information Technology (IT) Strategic Alignment: A Correlational Study Between the Impact of Its Governance Structures and It’s Strategic Alignment. Here is a synopsis of his great work. Congratulations Dr. Asante!
The details of the China hack on Google’s information assets reveal that it began with a link in an IM that ended up in a compromised employee desktop. How do we as security professionals prevent users from inadvertently putting the … Continue reading
Attached is a call for papers provided by Dan Shoemaker, University of Detroit Mercy. In his own words, “This is a primo publication opportunity for any academic and it is right smack dab in the mission for the CAEs.” If … Continue reading
This ZDNet item points to an investigation of a coordinated effort to create a network of compromised hosts for the purposes of cyber espionage against India, the United Nations and even the Dali Lama. The idea of large numbers of … Continue reading
I came across this article from The Sun recently. Whether serious or not (a hoax?) what are your thoughts on the possibility of such drastic tactics by terrorists?
Besides their busy jobs, many ISSA members would appear to be almost normal people, enjoying a good movie like anyone. But when you find yourself analyzing a movie once you get struck by its relation to your information security work, … Continue reading