The National Law Review has a great article on board member’s responsibility in the area of cyber security. One quote from the article: a 2012 Carnegie Mellon poll of how U.S. boards are managing cyber risks found that 71% rarely or never review privacy and security budgets, 80% rarely or never review roles and responsibilities, and nearly […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Tech Crunch has an interesting article on cyber security. The first part is tongue-in-cheek. All you need to do is disconnect from the internet, get rid of all your laptops and smartphones, use no cloud services and no mobile apps. You get the idea. All of the things that we know and love – and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
HR 4681, the Intelligence Authorization Act for FY 2015 was signed into law on December 19th, 2014 and provides funding for the intelligence community until next September. The bill and now law contains one section – section 309 – that deals with the collection, retention and sharing of information collected by the intelligence community. Because […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am certain we will see a number of people comment on what Sony shoulda/coulda/oughta have done and there is likely some truth in all of them. Here is one and my thoughts on it, from Data Breach Today. This is from a blog post by Matthew Schwartz. He makes 7 points, which I mostly […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Unlike the Sony breach in November, the group that took down Sony’s and Microsoft’s game network on Christmas (see article) seems to be very interested in getting attention. Hopefully enough so that the FBI finds them, but that is another story. What is more important is that the people who did this, according to Brian […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A presentation at the Chaos Communication Congress (a large hacker convention in Hamburg, Germany that attracted about 10,000 visitors this year – sort of, kind of, like Defcon here) demonstrated the ability to reproduce fingerprints of a target subject from just photographs. Reports in PC Magazine say that the researcher, Jan Krissler, took photographs of Ursula von […]
Continue reading →
[DISPLAY_ACURAX_ICONS]