August 25, 2012    /    by

Personal Password Protection: How to Strengthen Your Security to Avoid Digital Disaster

One of the hot topics at the MS-ISAC Annual Meeting and GFIRST in Atlanta this week was the recent Wired article by Mat Honan entitled: 'How Apple and Amazon Security Flaws Led to My Epic Hacking.'

One of the hot topics at the MS-ISAC Annual Meeting and GFIRST in Atlanta this week was the recent Wired article by Mat Honan entitled:  How Apple and Amazon Security Flaws Led to My Epic Hacking.

The entire article is worth reading, and may shock you into action. Here is the first paragraph of the article: READ MORE

August 22, 2012    /    by

GFIRST Conference Atlanta 2012

As in previous years, the GFIRST conference in being held during the same week as the MS-ISAC Annual Meeting and the InfraGard annual meetings. This allows a diverse group of experts from around the country to attend multiple events during one trip.

According to the event website, GFIRST is described like this:

“The Government Forum of Incident Response and Security Teams (GFIRST) is a group of technical and tactical practitioners from incident response and security response teams responsible for securing government information technology systems and providing private sector support. GFIRST members work together to understand and handle computer security incidents and to encourage proactive and preventative security practices across government agencies. GFIRST promotes cooperation among the full range of Federal, State and local agencies, including defense, civilian, intelligence, and law enforcement.” READ MORE

August 20, 2012    /    by

MS-ISAC Annual Meeting 2012 in Atlanta

I'm at the Multi-State Information Sharing & Analysis Center (MS-ISAC) Annual Meeting in Atlanta, where the state and local government Chief Security Officers (CSOs), Chief Information Security Officers (CISOs) and many of their top team members have gathered for three days.

   I’m at the Multi-State Information Sharing & Analysis Center (MS-ISAC) Annual Meeting in Atlanta, where the state and local government Chief Security Officers (CSOs), Chief Information Security Officers (CISOs) and many of their top team members have gathered for three days. The MS-ISAC is now a division of the Center for Internet Security (CIS), and this group plays a vital role in cybersecurity information sharing and situational awareness between the Department of Homeland Security (DHS) and state and local governments.

These meetings provide a venue for collaboration and comparing notes amongst the cyber leaders in federal, state and local government.  For the last few years, the meetings have been held in conjunction with the GFIRST conference, which is sponsored by DHS. READ MORE

August 18, 2012    /    by

Is That Wireless Network Legal?

Back in late June, I wrote about connectivity options while traveling during my vacation in Ocean City, Maryland. The blog was entitled: Vacation WiFi: What Networks Can We Trust? Now, thanks to some emails from an online friend who wishes to remain anonymous, I can offer Part 2 of this story.

Back in late June, I wrote about connectivity options while traveling during my vacation in Ocean City, Maryland. The blog was entitled: Vacation WiFi: What Networks Can We Trust? Now, thanks to some emails from an online friend who wishes to remain anonymous, I can offer “Part 2” of this story.

To summarize my vacation wireless options, I wrote: READ MORE

August 12, 2012    /    by

Cybermania: How do you spell cyber... everything?

Have you noticed some new words showing up in magazines and newspapers around the country? Words like: cyberattack, cyberwar , cybercrime and cyber... whatever.

Have you noticed some new words showing up in magazines and newspapers around the country? Words like: cyberattack, cyberwar , cybercrime and cyber…. whatever.

This brings up an interesting question: How do you spell cyber… anything? While this may seem like a trivial topic, I do think it matters. READ MORE

August 4, 2012    /    by

India Suffers Worst Power Outage in History: What Can We Learn?

Suddenly, without warning, no power. The blackout spreads. The grid goes down. What can we learn from this?

Suddenly, without warning, no power. The blackout spreads. The grid goes down. Six hundred million residents, which is one-tenth of the world’s population, left in the dark in the summer heat for a second day. That was India this past week.

Here’s one news report: READ MORE

July 28, 2012    /    by

Could The Olympics Bring Down Your Network? Here's Some Advice

The 2012 Summer Olympic Games are here, and the five to eight hour time difference between the mainland USA and the UK may be just the right combination to bust your work network(s).

I have some time sensitive information for network and security administrators around the country:

Don’t be lulled to sleep by the lack of network traffic at work from the Olympic Games opening ceremony. READ MORE

July 22, 2012    /    by

Game On: The London Olympic Security Teams Can Still Go for the Silver (Lining)

For security pros preparing for this massive undertaking, the unflattering headlines pretty much summed up ongoing security problems. But while gold may be out of reach, the security teams can still go for the silver lining.

The countdown clock began long ago. We’re now under a week to go until the 2012 Summer Olympic Games begin in the United Kingdom (UK). But sadly for security pros preparing for this massive undertaking, the unflattering headlines pretty much summed up ongoing security problems. Here are a few samples:

Wall Street Journal: An Olympic Security Mess READ MORE

July 14, 2012    /    by

Putting a Defensible Deletion Strategy in Place: An Interview with Jim McGann

e-Discovery, information management and the legal aspects associated with enterprise data are hot topics for technology leaders to address with their business customers. But what information governance strategies are legally defensible? What compliance approaches work best in the long run? How can enterprises reduce risk when they save or delete data?

Jim McGanne-Discovery, information management and the legal aspects associated with enterprise data are hot topics for technology leaders to address with their business customers. But what information governance strategies are legally defensible? What compliance approaches work best in the long run? How can enterprises reduce risk when they save or delete data?

To answer these questions, along with several related security topics, I recently interviewed Jim McGann, who is VP of Marketing for Index Engines, a leading electronic discovery provider based in New Jersey. READ MORE

July 7, 2012    /    by

What Can We Learn from Malware Monday?

Over the past few weeks, global news outlets have been warning users about Malware Monday and the pending Internet shutdown on July 9, 2012, for computers still infected with the DNSChanger malware. While the issue is certainly real, this blogger believes many headlines were (and still are) too alarmist. Can we learn anything from this?

Over the past few weeks, global news outlets have been warning users about Malware Monday and the pending Internet shutdown on July 9, 2012, for computers still infected with the DNSChanger malware. While the issue is certainly real, this blogger believes many headlines were (and still are) too alarmist.

For example, I view much of this material as “Fear, Uncertainty and Doubt” (FUD): READ MORE