Weekly Digest for March 24th

mdpeters posted 4 items. HORSE – Holistic Operational Readiness Security Evaluation.:General disclaimer HORSE – Holistic Operational Readiness Security Evaluation.:Privacy policy Anti-cybersquatting Consumer Protection Act Anti-cybersquatting Consumer Protection Act mdpeters posted 3 items. Main Page Main Page HORSE – Holistic Operational Readiness Security Evaluation.:About mdpeters posted User:Ledelars.

Juris Doctor 118-119 of 161

While I was doing some research on consumer protections in my Cyberspace Law class, I encountered the following policy that is certainly on the horizon for consumer protections. You can find the original press release here: Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework, The Department of Commerce internet policy… Read More

Weekly Digest for March 17th

mdpeters posted 5 items. User:Clemabun Main Page User:Vickorfo User:Wahbcai User:Nabioff mdpeters posted 6 items. User:Mdpeters HORSE – Holistic Operational Readiness Security Evaluation.:About Main Page File:Personal-CISO.jpg File:Michael-2010010102.jpg Main Page mdpeters posted 6 items. User:CrossView File:Linkedin.jpg Main Page Main Page Main Page Main Page mdpeters posted 2 items. Documents User:Mdpeters

Congratulations Your New Expinfo Account is Approved.

I received a confirmation message this morning though email from a company called Expinfo. Dear MICHAEL D, You have successfully registered with Expinfo Inc. Following are your Login details. I’ve never done business with, contacted, or knew these scoundrels existed but apparently, my alter impersonated expinfo-ego created an account and emailed me the credentials. This… Read More

Mobility Madness: Securely Extending Commerce to Mobile Users

With any emerging information technology, particularly those that interweave financial transactions, such as commerce and banking, one of the first concerns should be security. With an exponentially increasing number of consumers using mobile payment technologies, there is increased scrutiny of the precautions retailers are taking to guard these transactions. For retailers with mobile commerce sites… Read More

Twitter Weekly Updates for 2011-02-27

Blog Updates Twitter Weekly Updates for 2011-02-20 – Blog Updates Twitter Weekly Updates for 2011-02-13 Blog Update… http://ow.ly/1bqmpJ # HORSE Project Update User:Shadowfire1989 – New user account http://ow.ly/1bqmpI # Blog Updates Now Reading: Irrefutable Laws of Leadership – 18 http://ow.ly/1briZw # HORSE Project Update Internet Law Treatise – ? Older revision Revision as of 15:54,… Read More

Twitter Weekly Updates for 2011-02-20

Blog Updates Twitter Weekly Updates for 2011-02-13 – Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 h… http://ow.ly/1bjTZc # Blog Updates Juris Doctor 117 of 161 – I am definitely having fun with my Cyberspace Law class this term. The cou… http://ow.ly/1bjTZb # HORSE Project Update File:Poolball5.jpg – uploaded a new version of… Read More

The Weakest Link

I recently ran across a memorandum by the U.S. Citizen and Immigration Services (USCIS) that states: “Narcissistic tendencies in many people fuels a need to have a large group of ‘friends’ link to their pages and many of these people accept cyber-friends that they don’t even know. This provides an excellent vantage point for the… Read More

Juris Doctor 117 of 161

I am definitely having fun with my Cyberspace Law class this term. The course concludes this December so I have the rest of the year to immerse myself into a synergistic subject area. It is widely held that in general, lawyer’s knowledge about computers, and predictions they make about new technology, are highly likely to… Read More

Twitter Weekly Updates for 2011-02-13

Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 http://ow.ly/1bd7yL # Blog Updates Twitter Weekly Updates for 2011-02-06 – Blog Updates Domestic Terrorism According to a recent analysis… http://ow.ly/1bd7yM # Blog Updates CISO FYI 2011021001 – Security through Encryption Overview: As many companies begin the migration of th… http://ow.ly/1binPK # Powered by Twitter Tools

Domestic Terrorism

According to a recent analysis conducted by Akamai, out of the all the cyber-attacks observed originating from the 209 unique countries around the world identified, the United States was the top attack traffic source, accounting for 12% of observed attack traffic in total. Russia and China held the second and third place spots respectively, accounting… Read More