Although it’s a little early for the “what did you do on your summer vacation?” essay, I have mine done. I vacationed in Orlando...
Hi, what are you looking for?
Although it’s a little early for the “what did you do on your summer vacation?” essay, I have mine done. I vacationed in Orlando...
Are you ready for the zombie apocalypse? You know, the rising of the undead, coming to feed on your living flesh? Animated shuffling corpses...
Security standards exist because someone recognized a need. HIPAA, for example, was created to protect sensitive healthcare data. All information security regulations were created...
While reading recent articles on the Sony breaches, I noticed many comments in the forums saying things like, “if you connect to the Internet,...
We all have compliance issues. Compliance with HIPAA. Compliance with HITECH. Compliance with PCI. These are all well-defined regulations and standards that we should...
People are Vulnerable. Remind Them to be Conscious of, and Ready for an Attack.
The Android security model includes a sandbox-like environment that segregates applications and makes good use of shared memory. It also puts the user in...
Call them errors behind the keyboard, cockpit errors, or wetware errors. Sometimes we just say “oops.” But, these terms do not do them justice....
Corporate use of telecommuters is on the rise. Office space is expensive. Some companies use telecommuting as a way of reducing office space, while...
Dealing with Disgrunted Employees - Information Security Considerations
Answer me these questions three, ‘ere true security you see.What is your quest?
Security Professionals are Plagued with Lack of Resources, too Much Work, too Little Time, and Competing Priorities. As a Result, we end up with...