The articles below recount an interesting set of experiences in which the authors did everything they could to cover their digital tracks and avoid all electronic tracking. With a fair amount of effort and expense and success, they discuss the value of privacy and whether people at large are willing to actually do anything about it — or just gripe …
IoT Security: Fundamentally Flawed?
Rules for corporate survival: Assume good intentions when collaborating with colleagues in order to promote a healthy work environment. Assume inherent security flaws when dealing with anything connected to a network in order to ensure a secure work environment. Article by Debra Donston-Miller in Forbes. Emphasis in red added by me. Brian Wood, VP Marketing ——- The Internet Of Things …
IT Security: Are You Outraged? REALLY?
ATNA. All talk, no action. That’s basically what an exec at Juniper is saying about our collective response to cyber attacks. We say we care, but we don’t really care. Or do we? By Ericka Chickowski in Dark Reading. Emphasis in red added by me. Brian Wood, VP Marketing ——- Juniper Security Chief Takes Swipe At Security Apathy RSA CONFERENCE …
Do Security Perimeters Still Exist?
AIS recently hosted an IT Security whitepaper and webinar series that touched on the topic below. What is your opinion about the security perimeter; is it still a valid concept today? Article by Fred Donovan in FierceITSecurity. Emphasis in red added by me. Brian Wood, VP Marketing —— Is the security perimeter gone? IT execs weigh in SAN FRANCISCO–Is there …
What We Can Learn from Target
We can (and should) all learn from the Target breach. Pity the fool who laughs at the woes of another. Article by Dave Kearns in Dark Reading; Reuters article by Jim Finkle and Susan Heavey. Emphasis in red added by me. Brian Wood, VP Marketing ——- Target Breach: Where The Weak Points Were I’ve been fascinated by the information that …
Healthcare IT Security: “Alarming”
WAKE UP!!! The newly-released report below on the state of healthcare IT security is pretty bleak. Hopefully it will serve as a wake-up call to CIOs and CEOs everywhere that the bad guys are probably already running circles around you and they are using your data and network infrastructure as their personal playground. Need some help with IT security? When …
Shadow IT Yields Scary Silhouettes
Unintended consequences — that’s what happens when employees use unauthorized external IT resources without IT’s knowledge. It’s not that IT won’t allow it; heck, they might have a better option available…but neither will know without mutual awareness. Shadow IT is a growing problem for organizations of all sizes and types. So do yourself and your company a favor: get approval …
Security Incident Reporting
If you bite someone’s head off for bringing you bad news, that person is unlikely to bring you more bad news in the future. It’s human nature — and it’s too bad, because you probably just lost a valuable ally in the never-ending vigilance needed to remain secure. The more we involve our colleagues and celebrate transparency, the better off …
Rain on Parade? Top Cloud Security Threats
Double, double toil and trouble — there’s danger and grief stewing all throughout the cloud environment cauldron. Yikes, might as well stay in bed lest we get up and stub a toe or endure some unpleasantness on the way to the office. Or instead we could buck up and simply apply judicious caution while leveraging one of the greatest technological …
Infiltration: A Pen Tester’s View
Penetration testing is an effective, essential element of determining if your systems, processes, and employees are up to the task of securing your infrastructure. People are typically the weakest links in the chain — and particularly vulnerable to phishing emails. Read about some first-person experiences in the article below by Brian Prince in Dark Reading. Emphasis in red added by …