Blog
Dereliction of Data Protection – By a Law Enforcement Union
If you are not from the San Francisco Bay Area, you may not know that hackers gained access to the website operated by The Bay
Be Alert– Our Country Needs More Lerts!
A suspicious gun store clerk helped prevent another murderous rampage at Fort Hood, but why were other gun store owners ordered to sell weapons to people who shouldn’t have been able to buy them?
Workplace Recovery and PCs
In a Chinese kitchen, there is a lot of prep work to do before you can start cooking. The same is true before you can move into a workplace recovery center. Secure Pocket Drive from SPYRUS can make this prep work a lot easier.
HP and Oracle – Gloves Off, Teeth Bared
Two years ago I said that Oracle will begin to sell a juiced up Oracle Database Engine against Oracle running on any other platform. The recent goings on between HP and Oracle proved me correct. HP only has one answer – NonStop.
Pick a Number, Win the Lotto – How Citibank was Hacked
Hackers discovered that by changing a string of numbers at the end of the Citi Account Online URL, they could break into any account and steal names, account numbers, and email addresses. How could this happen, and is your company in the same situation?
How RSA Tokens Were Used To Hack Into Military Contractors
Apparently, the information taken during an attack on the RSA SecurID servers has been used to break in to one or more military contractors. How did this happen and what can you do to protect your organization?
Why Encryption Might Not Stop Data Theft
The most secure encryption system in the world might not have prevented the Sony and Epsilon data thefts. Encryption is totally useless if an attacker can get to the data as an authorized user. Separation of duties is paramount when it comes to protecting data from disclosure.
What Can We Learn From the RSA Hack?
The security professionals who work for RSA are some of the best in the business. If they’re so good and RSA still got hacked, what does that portend for your organization?
An Online Database Copy Is Not A Backup (Part 1)
Multiple data centers are the rage to keep downtime to a minimum. But there are many holes you can step in that will prevent successful implementation of a recovery strategy.
How Did A Private Access So Much Classified Info?
An Army Private downloaded hundreds of thousands of classified US government documents and snuck them out on writable CDs. How could this happen?
Crisis Response – Where Security and Disaster Recovery Meet
School and law enforcement officials in dozens of states worked together to develop and publish guidelines for putting together a Crisis Response Box—and every company should have one for first responders to an incident at your organization.
Toner Cartridges a Threat To Society As We Know It
Toner and ink cartridges over 16 ounces are banned on passenger flights. Is this the best way to prevent a terrorist attack?
“Fake Chips Threaten Military” say US Commerce Officials
A recent story in the San Jose Mercury News states that a growing deluge of millions of counterfeit chips is posing peril to the military
“The Most Significant Breach Of U.S. Military Computers Ever”
… was caused by a malware-loaded USB Flash Drive. Plugging the cigarette-lighter-sized flash drive into an American military laptop at a base in the Middle
SCADA Systems Under Attack
New malware spread on USB flash drives targets the default password on Siemens’ Simatic WinCC software to break in.
Has the IronKey Been Exposed?
A poster named Nexus is claiming that he removed the protective epoxy coating from an IronKey secure USB flash drive and it still works. Photos
What A Silly Yak I Am!
Steve Layman, one of my friends and a Hewlett-Packard co-worker, died of Non-Hodgkins lymphoma a couple of weeks ago a month short of his 44th
Secure Flash Drives Which Are
Several weeks ago I blogged about several brands of USB flash drives which were all breached in the same way. The rumor mill has it
I Got Burned And So Can You!
On Saturday, February 20th at approximately 2:20 p.m. Mountain Time, the shared server that my Internet domain is on experienced a hardware failure as a
Secure Flash Drives Which Aren’t
Three brands of secure flash drives easily can be unlocked due to an implementation flaw.