mdpeters posted 5 items. User:Clemabun Main Page User:Vickorfo User:Wahbcai User:Nabioff mdpeters posted 6 items. User:Mdpeters HORSE – Holistic Operational Readiness Security Evaluation.:About Main Page File:Personal-CISO.jpg File:Michael-2010010102.jpg Main Page mdpeters posted 6 items. User:CrossView File:Linkedin.jpg Main Page Main Page Main Page Main Page mdpeters posted 2 items. Documents User:Mdpeters
Mobility Madness: Securely Extending Commerce to Mobile Users
With any emerging information technology, particularly those that interweave financial transactions, such as commerce and banking, one of the first concerns should be security. With an exponentially increasing number of consumers using mobile payment technologies, there is increased scrutiny of the precautions retailers are taking to guard these transactions. For retailers with mobile commerce sites… Read More
Weekly Digest for February 24th
mdpeters posted HORSE – Holistic Operational Readiness Security Evaluation.:General disclaimer. mdpeters posted User:Shadowfire1989.
Twitter Weekly Updates for 2011-02-20
Blog Updates Twitter Weekly Updates for 2011-02-13 – Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 h… http://ow.ly/1bjTZc # Blog Updates Juris Doctor 117 of 161 – I am definitely having fun with my Cyberspace Law class this term. The cou… http://ow.ly/1bjTZb # HORSE Project Update File:Poolball5.jpg – uploaded a new version of… Read More
Weekly Digest for February 17th
mdpeters posted 7 items. Internet Law Treatise HORSE – Holistic Operational Readiness Security Evaluation.:Current events Main Page File:Poolball5.jpg Law File:Poolball5.jpg Main Page
The Weakest Link
I recently ran across a memorandum by the U.S. Citizen and Immigration Services (USCIS) that states: “Narcissistic tendencies in many people fuels a need to have a large group of ‘friends’ link to their pages and many of these people accept cyber-friends that they don’t even know. This provides an excellent vantage point for the… Read More
Juris Doctor 117 of 161
I am definitely having fun with my Cyberspace Law class this term. The course concludes this December so I have the rest of the year to immerse myself into a synergistic subject area. It is widely held that in general, lawyer’s knowledge about computers, and predictions they make about new technology, are highly likely to… Read More
Twitter Weekly Updates for 2011-02-13
Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 http://ow.ly/1bd7yL # Blog Updates Twitter Weekly Updates for 2011-02-06 – Blog Updates Domestic Terrorism According to a recent analysis… http://ow.ly/1bd7yM # Blog Updates CISO FYI 2011021001 – Security through Encryption Overview: As many companies begin the migration of th… http://ow.ly/1binPK # Powered by Twitter Tools
CISO FYI 2011021001
Security through Encryption Overview: As many companies begin the migration of their internally hosted email to cloud providers such as Google, several items that need to be discussed come to my mind to ensure your corporate privacy and security is maintained. There are plenty of crossover implications for personal privacy and security as well. Encryption… Read More
Domestic Terrorism
According to a recent analysis conducted by Akamai, out of the all the cyber-attacks observed originating from the 209 unique countries around the world identified, the United States was the top attack traffic source, accounting for 12% of observed attack traffic in total. Russia and China held the second and third place spots respectively, accounting… Read More
Juris Doctor 113 of 161
Back in the saddle for my final year of law school. Aside from being the last year which brings it’s own ray of sunshine with it, I am actually really looking forward to the subjects. This year will focus on more subject matter that I find naturally appealing. For example, Legal Analysis and Writing Legal… Read More
Now Reading: Irrefutable Laws of Leadership – 15
The Law of Victory: victorious leaders possess an unwillingness to accept defeat. The alternative to winning is totally unacceptable to them. When the pressure is on, great leaders are at their best. Whatever is inside them comes to the surface. The team doesn’t win a championship its players are working from different agendas. Leaders who… Read More
B.S. in Best Practices
Have you ever sat in a meeting with auditors or other third party professionals who will include the phrase “best practices” in their argument or report? I have no idea how many times security practitioners have tossed this phrase about to bolster their position. I’ve read that phrase countess times in articles published by reputable… Read More
Social Confessions
I am never surprised, but always intrigued by the apparent need by the larger percentage of the population to disclose, to reveal, to make confessions. So much of this is done to near or complete strangers. Social networks have provided a global forum for confessions (disclosures) to occur. Where once a person who felt so… Read More
How E-Commerce Apps Are Putting Your Site at Risk
Article Reprint: http://www.ecommercetimes.com/story/How-E-Commerce-Apps-Are-Putting-Your-Site-at-Risk-70964.html?wlc=1286281687&wlc=1286300892 Many developers do not overlook security on purpose; it’s just that the focus is usually on feature and functionality, not the nuts and bolts of building a secure software application. These technical oversights can leave a relatively easy opening for attackers to leverage. Cross-site scripting or data source injection are the most… Read More
Gearing Up for the Holidays? So Are Cyber-Criminals
Article Reprint: http://risnews.edgl.com/retail-best-practices/Gearing-Up-for-the-Holidays–So-Are-Cyber-Criminals40304 The holidays typically are the peak season for merchants. Yet at such a critical time of year many retailers still leave themselves vulnerable to significant e-commerce fraud – and the corresponding lost revenue and damaged brand reputation — because they don’t enforce or implement information security best practices throughout the year. While… Read More
Information Systems Security Association ISSA Fellow
I have been inducted into the Information Systems Security Association (ISSA) as a Fellow. ISSA participation has been a keystone component in my personal enrichment as a career security practitioner. As a global organization, membership has brought me closer to the world’s best and brightest in the business which has value difficult to quantify. I… Read More
Weekly Digest for August 5th
mdpeters New blog post: Weekly Digest for July 29th https://michaelpeters.org/?p=4813 [obDADkenobi]. mdpeters New blog post: Now Reading: Irrefutable Laws of Leadership – 11 https://michaelpeters.org/?p=4815 [obDADkenobi]. mdpeters Blog Updates Weekly Digest for July 29th – mdpeters New blog post: Weekly Digest for July 22nd http://michaelpeters…. http://ow.ly/18lgKy [obDADkenobi]. mdpeters Blog Updates Now Reading: Irrefutable Laws of Leadership… Read More
Information Systems Security Association Fellow Program
Much to my delight, I have been inducted into the Information Systems Security Association Fellow Program as a Senior Member. ISSA participation has been a keystone element in my personal development as a security practitioner. I am truly honored and humbled by this recognition.
The not-so-funny thing about passwords
There is an emerging problem with the traditional password. In reality, it is no longer an emerging conundrum, but, it is well entrenched within every organization, home office, and remote location. The dilemma is in technological proliferation coupled with the obvious need to provide accessibility to our users. A great example illustrating the problem comes… Read More
Certified in Risk and Information Systems Control (CRISC)
I’ve received a Certified in Risk and Information Systems Control (CRISC) certification number of 1000201. I personally believe that the CRISC will be the industry standard for risk management just as the CISSP has been for information security practitioners. I certainly recommend pursuing this certification.
Weekly Digest for May 27th
mdpeters Blog Updates Blog Updates Now Reading: Irre – Blog Updates Now Reading: Irrefutable Laws of Leadership – 7 http://o… http://ow.ly/17qNQh [obDADkenobi]. mdpeters New blog post: Weekly Digest for May 20th https://michaelpeters.org/?p=1559 [obDADkenobi]. mdpeters Blog Updates Weekly Digest for May 20th – mdpeters New blog post: Weekly Digest for May 13th http://michaelpeters.o… http://ow.ly/17r7rK [obDADkenobi]. mdpeters… Read More
Juris Doctor 85 of 215
So I’ve been spending a bit of time with the Federal Rules of Civil Procedure and I of course look for connections to the activities I’m involved in such as my day job as Chief Information Security Officer. A trend that I’ve commentated upon heavily over the past two years concentrates on what is being… Read More
Weekly Digest for April 29th
mdpeters New blog post: Weekly Digest for April 22nd https://michaelpeters.org/?p=1451 [obDADkenobi]. mdpeters posted 2 items. IT Change Management It-governance mdpeters posted 9 items. Microsoft Operations Framework ISO 20000 Change control ISO 20000 Microsoft Operations Framework IT Change Management Microsoft Operations Framework ISO 20000 File:MOF-all.gif mdpeters New blog post: Persistent Blogging 3.0 https://michaelpeters.org/?p=1456 [obDADkenobi]. mdpeters is… Read More