The government is never going to fix its cybersecurity problem until it fixes its procurement problem! Shockingly, there are no NAICS, SIC or SIN CODES for cybersecurity products on the GSA Schedule. As a California Certified Small Business owner who offers...
Pass the Hash Protections. Last week I attended the BSide LA hackers’ conference to discuss that passwords are secure. At first, some of the attendees scoffed at my claim. I then went on to explain that it’s the management of passwords and the way some IT...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security...
Google is gathering your personal and corporate data. Google Inc. (GOOG) motto is, “do no harm.” But who defines what is harmful? Employees recently testified to the U.S. Federal Communications Commission that they didn’t initially know...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
Network Access Authentication using a Magnetic Stripe Card Access Smart®, LLC expands our network access authentication product line for data security. Power LogOn for MagStripe allows any issued magnetic stripe card to be used to log onto a computer and network....
I have written many articles and blogs warning about the cost to a company from a security breach. Ben Worthen, a staff reporter in The Wall Street Journal’s San Francisco bureau, wrote a great article “What to Do if You’ve Been Hacked” on...
The simple answer? Hacking won’t stop. To paraphrase Willie Sutton, bank robber, “That’s where the money is.” PBS, Sony, Lockheed, Amazon, IMF, US Senate, etc., all announced in 2011 that their systems were hacked. Security...
In the ComputerWorld article “Judge rules against trial in lawsuit by victim of $588K cyber heist” by Jaikumar Vijayan about the lawsuit between Patco and Ocean Bank there were no winners here. There were mistakes done on both sides and lack of...