Category Archives: Current Topics

← Older posts

(ISC)2 webinar – From the Trenches: BYOD Program Deployments

Posted on by Capella University

(ISC)2 webinar – From the Trenches: BYOD Program Deployments Capella employee, Matt Pellowski, is participating as a speaker in this roundtable discussion.   DATE: April 10th TIME: 12:00 PM Central Join this unique roundtable chat with three InfoSec Professionals who … Continue reading

Tags: , , ,
Posted in Education, Event-News, Events, Events-News, News, Security, Training and Seminars | | 1 Comment

ISACA Webinar: Data-Driven Security – Using “Big Data” to protect the Enterprise

Posted on by Capella University

ISACA Webinar – Sponsored by Capella DATE: March 27th TIME: 11:00 Central TITLE:  Data-Driven Security – Using “Big Data” to Protect the Enterprise                                                                      SPEAKER: Pete Lindstrom, Principal, Spire Security, LLC ABSTRACT: Data – big, small, or the perfect size for … Continue reading

Posted in Education, Event-News, Events, Events-News, News, Security, Training and Seminars, Uncategorized | | Leave a comment

NIST Framework 1.0 and Road Map

Posted on by Mary Brown

Today NIST published their Critical Infrastructure Security Framework 1.0 and an associated Road Map for how they view the evolution of the framework advancing over the near future. Share your thoughts.

NIST proposes security infrastructure framework

Posted on by Mary Brown

NIST has a proposal for a framework that public and private entities would follow in order to create a secure infrastructure.  They are looking for comments so if you have an interest in how these rules turn out, I encourage … Continue reading

Bruce Schneier on taking back the Internet

Posted on by Mary Brown

Bruce Schneier, creator of some of the earlier encryption methodologies, has posted an interesting discussion about changes needed to restore trust in the concept of encryption that has taken some hard hits lately. http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying  

Security and Privacy Implications of Skype?

Posted on by Mary Brown

http://www.h-online.com/security/news/item/Skype-with-care-Microsoft-is-reading-everything-you-write-1862870.html Interesting article on Skype privacy and security – do those of you who use Skype have risk management strategies that they can recommend?

Tags:
Posted in Security | | Leave a comment

Healthcare Participation in Federal Cyber Security Guidance

Posted on by Mary Brown

The push towards moving the healthcare industry conversion to electronic collection and storage of health encounter data has increased concern for the potential impact on patient privacy.  This has generated increased interest by various healthcare stakeholders in providing input to … Continue reading

Posted in Security | | Leave a comment

ISC2 Scholarship Opportunity

Posted on by Mary Brown

There is a fast growing demand, but short supply, of well-trained information security professionals. Join us in our commitment to ensuring the pipeline of today is being filled for the needs of tomorrow. Forward this email to any and all … Continue reading

New Take on Steganography?

Posted on by Mary Brown

Interesting article on strategies for ‘hiding’ information in plain site: http://phys.org/news/2013-03-steganography.html

Posted in Security | | Leave a comment

Where do we draw the lines?

Posted on by Mary Brown

There is a link to the national news that describes an incident that presents some interesting conflicts: http://news.nationalpost.com/2013/01/20/youth-expelled-from-montreal-college-after-finding-sloppy-coding-that-compromised-security-of-250000-students-personal-data/ A student was expelled according to the article because he found poorly written code while working on a project. Finding and reporting … Continue reading

← Older posts