Teach the children and let them lead the way. Teach the employees and save yourself a lot of headaches. Article by Violet Blue for Zero Day and republished in ZDNet. Emphasis in red added by me. Brian Wood, VP Marketing —— How hackers use employees to break through security walls Summary: Employees are prime targets for cybercrime attacks against your …
Is Data Privacy an “Old Fashioned” Concept?
The article below by John Bryan in Naked Security is the yin to tomorrow’s yang on the same topic — so be sure to check back mañana. The essence of the debate is whether we are gearing up to fight the last war rather than recognizing that the threats (and what we value) have changed over time. Emphasis in red …
Cyber Black Market More Profitable than Illegal Drugs
Underground economics, reputation, and the code of honor. Sometimes truth is just as exciting as fiction! Interesting stuff. Article by Violet Blue for Zero Day and reprinted in ZDNet. Emphasis in red added by me. Brian Wood, VP Marketing ——- Hackonomics: ‘Cyber Black Market’ more profitable than illegal drug trade Summary: OPINION: A new report by RAND commissioned by Juniper …
Big Data: A Lawyer’s Perspective
Just because you have it — or have access to it — doesn’t mean that you should use it. (Especially if “it” is personal data from the good citizens of Europe, as European privacy laws are different (and stricter) than those in the United States.) Blog post by David Snead in The WHIR. Emphasis in red added by me. Brian …
Motherhood: Wired Network Security
Wash your hands, brush your teeth, take your vitamins, and secure your network. Article by Eric Geier in Network World. Emphasis in red added by me. Brian Wood, VP Marketing —— 8 ways to improve wired network security We sometimes focus more on the wireless side of the network when it comes to security because Wi-Fi has no physical fences. …
Identity Theft Is Consumers’ Top Complaint
This is the 14th year in a row in which Identity Theft is consumers’ number one concern reported to the Federal Trade Commission. Be careful about what you click! Summary article by David Weldon in FierceCIO, original article by Michael Cooney in Network World. Emphasis in red added by me. Brian Wood, VP Marketing ——– Identity theft still top consumer …
I Admit It: The Title of This Post Grabbed Me
New rule for corporate happiness: Assume colleagues have good intentions but networked devices are hostile by default. Don’t trust, and definitely verify. By Bob Bradon in CSO. Emphasis in red added by me. Brian Wood, VP Marketing —— Forget the Internet of Things…this is the Internet of Crap This month I’m taking my own look at the Internet of things …
CyberTini, April 2 in San Diego
Wednesday, April 2, 2014 Rescue Mission Rooftop Parking Garage Across from CyberHive 1855 1st Ave. San Diego, CA 92101 5:30 to 8:00 PM The CyberTECH CyberTini event is the quarterly networking mixer that builds the cyber security, Internet of Things, and big data and analytics community and enables high tech entrepreneurship and economic development in our region. A just completed …
Hey, This Is Important. C’mon Guys, Pay Attention!
When passwords can be reset and online accounts simply accessed from another connected device, who cares whether this little handheld thingy gets lost or stolen? Besides, isn’t that what insurance is for? My contacts and calendar are available to me elsewhere. What’s that? Oh yeah… I guess there is indeed corporate data that’s also on the phone that someone else …
Do We Root for the Bad Guys?
In the movies we like underdogs and rebels and outlaws and anyone bucking “the system”. The crimes are not personal; they are often against “the regime”, a faceless but oppressive big brother-ish entity that demands obedience if not fanatical support. But what happens when the victim is you? Or your sibling or colleague? Or your dentist or yoga instructor? Opinion …