Monthly Archives: June 2010


Security Leadership Roundtable on July 13

Posted on by Dr. Steven Brown

Please join us for the upcoming (ISC)2 ThinkTank – a Security Leadership Roundtable on “Data Privacy and Security: Where Are Regulations Headed?” co-produced by the International Association of Privacy Professionals (IAPP), and sponsored by Capella University and Lumension on July … Continue reading

Posted in Current Topics, Events, Security | | Leave a comment

Russian Spies Use Steganography to Exchange Information

Posted on by Mary Brown

Those of us who teach information security are pretty excited to have an actual case involving the use of steganography to which we can point validating the threat beyond the sphere of research and speculation. Do you think this is … Continue reading

Posted in Current Topics | | Leave a comment

The Protecting Cyberspace as a National Asset Act of 2010

Posted on by Dr. Steven Brown

In the event that the United States is subject to a cybersecurity attack, Congress wants to give the President of the United States the ability to shut down parts of the Internet. While this might seem drastic, there is a … Continue reading

Posted in Current Topics, Security | | Leave a comment

Who Controls the Internet?

Posted on by Mary Brown

A panel of experts met recently to have a debate on cyber war, that led to a discussion of the degree to which the government uses information security as an excuse to control the Internet and data that swirls around … Continue reading

Posted in Current Topics, Security | | Leave a comment

Lots of federal legislation in the pipeline. What does it mean?

Posted on by Mary Brown

There are no less than 35 cyberlaws making their way through the US congress these days. Among them is a proposal by Joe Lieberman and Susan Collins that would make DHS the central manager for cybersecurity. Do you think this … Continue reading

Posted in Current Topics | | 3 Comments

Judge limits DHS laptop border searches

Posted on by Dr. Steven Brown

Travelers entering the United States (including U.S. Citizens) were subject to having their laptops taken and searched for six months without warrant. A U.S. federal judge has ruled that the DHS cannot hold onto these devices without cause. The DHS … Continue reading

Tags: ,
Posted in Current Topics | | Leave a comment

Scientist Infects Himself with Computer Virus

Posted on by Mary Brown

Mark Gasson decided not just to be one of those on the cutting edge using implantable RFID chips as an authentication device, he took his research one step further. There has been speculation that these human implanted chips could be … Continue reading

Posted in Current Topics | | Leave a comment