Tag Archives: compliance
CAUTION: RANT ALERT On Wednesday, November 19, Admiral Michael Walters, the head of the NSA made a very disturbing announcement. He said that China and one or two other countries have the capability to launch a cyber attack that could … Continue reading
A hot debate over the inherent security benefits of open source software — or lack thereof — has been raging (again) since the “heartbleed” bug came to light last spring. So…..from a security expert’s point of view (yes, mine!), is … Continue reading
Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading
From the title you might be thinking that the theme of this article is something like “information security is war.” But that’s not it.
Have you ever encountered a situation where a user needed to use an application that displayed all of the rows in a file, but the user really should be restricted from seeing certain rows in that file?
Did you ever think that the potential cost of a security breach is overstated by those who want to sell you security software or services? Well, no matter how you add it up, the potential cost to Target during the … Continue reading
A while ago I ran across this white paper from KPMG Netherlands: The five most common cyber security mistakes: Management’s perspective on cyber security. As I was reading it I found myself making my own list. My list is called “5 … Continue reading
I recently collaborated with Patrick Townsend, CTO Townsend Security, on an encryption key management white paper. The paper is targeted at the IBM i audience but actually contains useful information for folks using any platform.
This from a LinkedIn group post published on SecurityInfoWatch.com: “In the ever evolving threat landscape that is IT security, some security executives have become so focused on taking an approach that meets compliance requirements that their attention has become diverted … Continue reading