March 22, 2012    /    by

Lawsuits Challenge Privacy Policies

Internet privacy has long been a hot-button issue. Central questions are being asked about who owns what data, how that data can be used by various companies to target individuals in marketing and whether users can opt-in or opt-out of various data-sharing approaches. Just as in other areas of life in America in 2012, these questions are often end up being settled in the courts.

March 18, 2012    /    by

Perspectives on IT Security in Eastern Europe: First Impressions from Two Very Different Cities

I traveled to Eastern Europe last week to speak at two different one day cybersecurity conferences that are a part of a series of events known as the IDC IT Security Roadshow 2012.

March 8, 2012    /    by

Will New Cybersecurity Legislation Pass in 2012?

Will new cybersecurity legislation pass in 2012? If yes, what will be included, what will be left out and which agencies or organizations will be in charge of various information sharing and monitoring roles? These are hot questions in DC right now.

March 4, 2012    /    by

Hacker Hangouts: Where the Young and Restless Go to Learn How to Hack

But where do hackers live and spend their time? Beyond Black Hat Conferences around the world, where do hackers congregate online? As security pros scan the world-wide-web for the good, the bad and the ugly, we come across information, tools and methods that the majority of people dont know exist.

February 26, 2012    /    by

When Do Social Networks Become a Burden?

How many online social networks have you joined? I'm starting to wonder if there are too many social media sites that I participate in. Is a backlash coming?

February 18, 2012    /    by

Defining Cyber FUD: The Bad, The Good and The Ugly

FUD is a complicated topic. FUD can be your friend or your worst enemy. It can light a fire under cyber initiatives, or end a career. It can influence decisions in the middle of a crisis. Regardless of the story, FUD is important to master and thats not just hype.

February 7, 2012    /    by

Cyber Training: Are All the Best Technology & Security Conferences Out of State?

It's that time of year when my email in-box starts filling up with invitations to events surrounding the RSA conference in San Francisco. Nevertheless, some of my best experiences have been at security and technology conferences near home.

January 30, 2012    /    by

DMARC Should Reduce Phishing Scams

Major technology vendors announced the formation of the Domain-based Message Authentication, Reporting and Conformance (DMARC) system today. This new email authentication framework should reduce the number of phishing scams that try to trick users into thinking emails are from someone else.

January 25, 2012    /    by

Anti-Piracy Legislation Protests Continue: FTC Cyber Awareness Site Down

The Federal Trade Commissions website at remained down for a second day after it had suffered a security breach.

January 20, 2012    /    by

DOJ Shuts Down Megaupload, Anonymous Retaliates

This is turning into a wild week for headline-grabbing cyber activity. Immediately following Internet protests of proposed new legislation to crack down on Internet piracy, the Department of Justice (DOJ) moved quickly to shut down one of the most popular websites known for illegal downloads called Magaupload.