July 22, 2012    /    by

Game On: The London Olympic Security Teams Can Still Go for the Silver (Lining)

For security pros preparing for this massive undertaking, the unflattering headlines pretty much summed up ongoing security problems. But while gold may be out of reach, the security teams can still go for the silver lining.

The countdown clock began long ago. We’re now under a week to go until the 2012 Summer Olympic Games begin in the United Kingdom (UK). But sadly for security pros preparing for this massive undertaking, the unflattering headlines pretty much summed up ongoing security problems. Here are a few samples:

Wall Street Journal: An Olympic Security Mess READ MORE

July 14, 2012    /    by

Putting a Defensible Deletion Strategy in Place: An Interview with Jim McGann

e-Discovery, information management and the legal aspects associated with enterprise data are hot topics for technology leaders to address with their business customers. But what information governance strategies are legally defensible? What compliance approaches work best in the long run? How can enterprises reduce risk when they save or delete data?

Jim McGanne-Discovery, information management and the legal aspects associated with enterprise data are hot topics for technology leaders to address with their business customers. But what information governance strategies are legally defensible? What compliance approaches work best in the long run? How can enterprises reduce risk when they save or delete data?

To answer these questions, along with several related security topics, I recently interviewed Jim McGann, who is VP of Marketing for Index Engines, a leading electronic discovery provider based in New Jersey. READ MORE

July 7, 2012    /    by

What Can We Learn from Malware Monday?

Over the past few weeks, global news outlets have been warning users about Malware Monday and the pending Internet shutdown on July 9, 2012, for computers still infected with the DNSChanger malware. While the issue is certainly real, this blogger believes many headlines were (and still are) too alarmist. Can we learn anything from this?

Over the past few weeks, global news outlets have been warning users about Malware Monday and the pending Internet shutdown on July 9, 2012, for computers still infected with the DNSChanger malware. While the issue is certainly real, this blogger believes many headlines were (and still are) too alarmist.

For example, I view much of this material as “Fear, Uncertainty and Doubt” (FUD): READ MORE

June 30, 2012    /    by

Vacation WiFi: What Networks Can We Trust?

I was recently on vacation with my family in Ocean City, Maryland. As I powered up my iPad from our fifth floor condo on 136th Street, more than a half dozen wireless networks popped up. I asked myself: Can I use (or trust) any of these? Are they free? Is it worth the risk, if they are?

 I was recently on vacation with my family in Ocean City, Maryland. As I powered up my iPad from our fifth floor condo on 136th Street, more than a half dozen wireless networks popped up.  I asked myself: Can I use (or trust) any of these? Are they free? Is it worth the risk, if they are?

The names were intriguing to me, ranging from Netgear58-5G to Oceanside136 to OceanNet Public Internet ST to Wireless Beach Access.  Some of these networks had locks next to them and others did not.  Clicking on a few of the options, I received a splash screen asking for a credit or debit card numbers. The price for access ranged from $4.99 for one hour to $9.99 for 24 hours to $42.99 for one month (31 days). READ MORE

June 16, 2012    /    by

Favorite Survival Tips for Using Social Media

What's appropriate and what's not regarding the use of social networks? Beyond formal codes of conduct at work, what behaviors and attitudes will likely lead to trouble? What tips can we share from those who have gone before us and learned about the good, the bad and the ugly? What good habits enable a positive experience in the long run? And, what are some examples of social media technology being used in destructive ways that undermine relationships?

  What’s appropriate and what’s not regarding the use of social networks? Beyond formal codes of conduct at work, what behaviors and attitudes will likely lead to trouble? What tips can we share from those who have gone before us and learned about the good, the bad and the ugly?  What good habits enable a positive experience in the long run? And, what are some examples of social media technology being used in destructive ways that undermine relationships?

These are topics that need more attention, in my opinion. READ MORE

June 10, 2012    /    by

Advice Following LinkedIn Hack: Change, Don't Reuse, Your Passwords

Computer experts from around the world are warning users to change passwords immediately following the announcements that millions of passwords from LinkedIn, eHarmony and Lastfm were posted on hacker websites.

Computer experts from around the world are warning users to change passwords immediately following the announcements that millions of passwords from LinkedIn, eHarmony and Lastfm were posted on hacker websites.

The Internet is full of stories about various topics surrounding the breaches as well as articles on how to effectively protect passwords. Here’s an excerpt from a Washington Post article on the password breaches: READ MORE

June 4, 2012    /    by

Front Page Cyber: Stuxnet and Flame have Changed the Discourse

A new era began this weekend in cyberspace. Starting with the New York Times article dated June 1, 2012, which proclaimed: Obama Order Sped Up Wave of CyberAttacks Against Iran, the global discourse regarding cyber attacks has now shifted.

A new era began this weekend in cyberspace. Starting with the New York Times article dated June 1, 2012, which proclaimed: Obama Order Sped Up Wave of CyberAttacks Against Iran, the global discourse regarding cyber attacks has now shifted. 

This NY Times article openly discusses cyberweapons and the efforts that the US Government took to derail the computers that run Iranian nuclear enrichment facilities. Here’s a brief excerpt: READ MORE

May 28, 2012    /    by

How Do Social Networks Get Hacked? A Lulzsec Case Study

How do social networking sites get attacked by hackers? What methods are used? Why are attacks successful? What can be done to improve security on social networks?

How do social networking sites get attacked by hackers? What methods are used?  Why are attacks successful? What can be done to improve security on social networks?

These are just some of the questions that are addressed in a recently-published Hacker Intelligence Report by Imperva. The report’s executive summary offers an intriguing glimpse into the hacktivist world that threatens almost every online service. Here’s an excerpt: READ MORE

May 20, 2012    /    by

Reinventing (or Removing) Cash Registers with new Shopping Security

Ever since I read Megatrends in 1988, Ive been fascinated by predictions about how technology will alter our daily lives in the near-future. One area that is evolving quickly is our shopping experiences both online and offline.

Ever since I read Megatrends in 1988, I’ve been fascinated by predictions about how technology will alter our daily lives in the near-future.  One area that is evolving quickly is our shopping experiences both online and offline.

 What’s next? Get ready for the reinvention of the cash register – with competing visions for how that will happen. What’s fairly certain is that our smartphones, iPads and/or other mobile devices will become an integral part of the new check-out process. READ MORE

May 12, 2012    /    by

How Multitasking Hurts Our Productivity

Most of us always trying to do multiple activities at the same time. But is it really working?

  Most of us are trying to do multiple activities at the same time. But is it really working?

  For example, I like to keep “to do” lists. I get special satisfaction when I complete one action item and the result is that multiple items come off of my list. More often than not, I’m tempted to multitask, especially at work. On top of that, I’m instinctively looking for new tips and shortcuts that can help me gain a further edge in accomplishing my personal and professional goals. READ MORE