mdpeters posted User:LandryGardnerjtz. mdpeters posted 2 items. User:Ballann69 User:Teetemp mdpeters posted User:Bloodfire71.
Weekly Digest for August 11th
mdpeters posted . mdpeters posted User:Paige84.
Insecurity
If you think that absolute security exists you would be absolutely incorrect. Speaking as a security practitioner who has been in the business for as long as there has been a security business, I’ll tell you with a straight face that no technology system exists that is completely secure or one hundred percent impenetrable. The… Read More
Reality Check
“A human loses contact with reality if he or she is not surrounded by validated information.” – Michael D. Peters
Juris Doctor 135-143 of 161: The Geek Shall Inherit the Universe
Cyber-espionage and Cyber-warfare poses the greatest threat to our society today. No longer are massive militarized forces with the most advanced weaponry the force to fear. The forces to be feared now are computer geeks. A single person or just a few cyber-savvy individuals working together as a team now possess the power to bring… Read More
Dropbox? More Like Dropball!
There has been a putative class action complaint filed on June 22, 2011, in the United States District Court, for the Northern District of California alleging that the popular cloud-based storage provider Dropbox, Inc. failed to secure its users’ private data or to notify the vast majority of them about a recent data breach. According… Read More
Weekly Digest for July 27th
mdpeters posted User:Ekete. mdpeters posted User:Entlipa.
David (Michael) v. Goliath (Register.com)
I have several domain names registered. Over the years, the registrars I’ve used at times have changed and this is driven largely by competitive parking prices. A domain is very much like an automobile. You make a visit to the dealership (registrar) and purchase the vehicle of choice. You make regular payments and enjoy your… Read More
March to a different drummer
“He who joyfully marches to music in rank and file has already earned my contempt. He has been given a brain by mistake, since for him the spinal cord would fully suffice.” — Albert Einstein
How do you transition your IT teams from a technology to business mindset?
It is incumbent upon the technology leadership, who should already have an excellent business grasp, mentor, demonstrate and illustrate what lines of activities comprise the essence of the company’s mission. Only then will the supporting staff be able to accurately support those business activities with an accurate technological layer. If the technology leader does not… Read More
Back to Basics
“A man loses contact with reality if he is not surrounded by his books.” – Franois Maurice Mitterrand I am not certain when Mitterrand made that statement, but it may have very well been in my lifetime since he died in 1996. In our current age of digital books, Nooks and Kindles, reality television and… Read More
New PCI Data Security Standards for Cloud Compliance
The PCI Security Standards Council’s Virtualization Special Interest Group recently published its “Information Supplement: PCI DSS Virtualization Guidelines” (the “Guidelines”) to Version 2.0 of the PCI Data Security Standard (“PCI DSS”). The Guidelines provide context for the application of the PCI DSS to cloud and other virtual environments, and offer at least three critical reminders:
Weekly Digest for July 7th
mdpeters posted User:Aleadala.
Weekly Digest for June 30th
mdpeters posted User:Tschmied.
Weekly Digest for June 23rd
mdpeters posted User:Tayar77.
Weekly Digest for June 16th
mdpeters posted User:Mdpeters.
Paella picante de Michael
Ingredients: 1 rounded cup organic Endamame beans shelled 1/2 cup extra virgin olive oil 3 lb. cured Chorizo or Andouille, cut into thin pieces Salt and freshly ground pepper, to taste 1 large Vidalia onion, chopped 2 garlic cloves, minced 1/2 tsp. saffron threads, crushed 4 Rome tomatoes, peeled, seeded and chopped 4 cups organic… Read More
$7.2 million – cost of a data breach
The average organizational cost of a data breach increased to $7.2 million and cost companies an average of $214 per compromised record. What’s protecting you? Check out the CrossView Security playbook http://bit.ly/m3qnWD #CMO #retail
Juris Doctor 134 of 161 – AKA Citizen Journalists … Not!
There has been an interesting ruling this week issued by the New Jersey’s Supreme Court concerning journalist source protections and the delineation between who may be able to claim the protections granted journalists. The Court ruled that bloggers and online posters don’t have the same protections for sources as mainstream journalists do. While I certainly… Read More
Juris Doctor 130-133 of 161
I’ve thoroughly enjoyed Cyberspace Law over the past three weeks exploring subject matter in ISP Liability for Speech, Anonymous Communications in Cyberspace, and Content Regulation in Cyberspace. A particular facet I have derived more amusement from than normal is concerned with the concept of anonymity. From a technical perspective, true anonymity does not actually exist.… Read More
Weekly Digest for June 2nd
mdpeters posted User:Infocures.
Weekly Digest for May 26th
mdpeters posted User:Sroberts77.
Weekly Digest for May 12th
mdpeters posted 6 items. CAN-SPAM CAN-SPAM File:A8F65d01.pdf Spam CAN-SPAM User:Greenvictim97
We Eat Our Own
Our reasonable expectation of privacy is an illusion similar to the “job security” myth perpetuated by so many workers. The power to control your identity, privacy and security has less and less to do with the individual and more to do with corporate honor or criminal intent both of which sometimes have blurry demarcation. We… Read More