It is frequently in the news. Reports have been written. Punitive and compensatory damages have been awarded. Companies around the globe have been challenged to find the resources required to comply with the Payment Card Industry Data Security Standard (PCI DSS). The prime PCI DSS objective is to protect cardholder data. The prime objective of… Read More
Juris Doctor 135-143 of 161: The Geek Shall Inherit the Universe
Cyber-espionage and Cyber-warfare poses the greatest threat to our society today. No longer are massive militarized forces with the most advanced weaponry the force to fear. The forces to be feared now are computer geeks. A single person or just a few cyber-savvy individuals working together as a team now possess the power to bring… Read More
We Eat Our Own
Our reasonable expectation of privacy is an illusion similar to the “job security” myth perpetuated by so many workers. The power to control your identity, privacy and security has less and less to do with the individual and more to do with corporate honor or criminal intent both of which sometimes have blurry demarcation. We… Read More
Now Reading: Irrefutable Laws of Leadership – 21
The Law of Legacy: A leader’s lasting value is measured by succession. My life sentence is, “I want to add value to leaders who will multiply value to others.” Most people simply accept their lives – they don’t lead them. Someday people will summarize your life in a single sentence. My advice: pick it now!… Read More
Gearing Up for the Holidays? So Are Cyber-Criminals
Article Reprint: http://risnews.edgl.com/retail-best-practices/Gearing-Up-for-the-Holidays–So-Are-Cyber-Criminals40304 The holidays typically are the peak season for merchants. Yet at such a critical time of year many retailers still leave themselves vulnerable to significant e-commerce fraud – and the corresponding lost revenue and damaged brand reputation — because they don’t enforce or implement information security best practices throughout the year. While… Read More
KISS – Keep It Simple Security – 2009090101
I was reading the latest report published by Deloitte titled “The 6th Annual Global Security Survey.” I did enjoy the survey results and I do intend on using a portion to help shape my general information security strategy in my practice. Certain fundamentals are always sound and always obvious. One quote that I’ll comment on… Read More
Cloud Computing: Part 2
Internet information exchange and commerce has matured to the point that we cannot imagine how we would run our businesses without technology anymore. We have created elaborate systems and constructed solid disaster recovery and business continuity mechanisms to protect our digital assets. Until recently, these Internet facing systems have resided on dedicated computers that we… Read More
Cloud Computing, AKA SaaS
Synopsis: The effective weak link of cloud computing: An oversight by a single vendor creates a single point of failure that can have devastating effects on an untold number of its customers. Commentary: Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and… Read More