720-891-1663

Board Of Directors Role In Cyber Security

The National Law Review has a great article on board member’s responsibility in the area of cyber security. One quote from the article: a 2012 Carnegie Mellon poll of how U.S. boards are managing cyber risks found that 71% rarely or never review privacy and security budgets, 80% rarely or never review roles and responsibilities, and nearly […]

Continue reading → [DISPLAY_ACURAX_ICONS]

HR 4681 and government surveillance

HR 4681, the Intelligence Authorization Act for FY 2015 was signed into law on December 19th, 2014 and provides funding for the intelligence community until next September.  The bill and now law contains one section – section 309 – that deals with the collection, retention and sharing of information collected by the intelligence community.  Because […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Background on the group that took down Sony and Microsoft on Christmas

Unlike the Sony breach in November, the group that took down Sony’s and Microsoft’s game network on Christmas (see article) seems to be very interested in getting attention.  Hopefully enough so that the FBI finds them, but that is another story. What is more important is that the people who did this, according to Brian […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why fingerprints should not be used for access control

A presentation at the Chaos Communication Congress (a large hacker convention in Hamburg, Germany that attracted about 10,000 visitors this year – sort of, kind of, like  Defcon here) demonstrated the ability to reproduce fingerprints of a target subject from just photographs.  Reports in PC Magazine say that the researcher, Jan Krissler, took photographs of Ursula von […]

Continue reading → [DISPLAY_ACURAX_ICONS]