Corporate Records: Voice-mail

As electronic discovery matures to meet the ever-changing technology landscape, it is incumbent upon the information security practitioner, forensic investigator, General Counsel, or others responsible for the discovery, acquisition, processing, preservation, and presentation of electronic records to keep swimming or risk drowning. There should be no illusion that voicemail would be considered an electronic record… Read More

Social Networks and Social Engineering

I’ve commented occasionally about social networking site and appropriate content posted therein. I’ll share an article I read on a favorite news site. It is an amazing abuse of authority in my opinion. It also demonstrates the hazards of what could happen when low-tech mentality bludgeons high-tech. Original URL: http://www.theregister.co.uk/2009/06/18/american_burg_and_facebook/ US city demands FaceSpaceGooHoo log-ins… Read More

Cloud Computing: Part 2

Internet information exchange and commerce has matured to the point that we cannot imagine how we would run our businesses without technology anymore. We have created elaborate systems and constructed solid disaster recovery and business continuity mechanisms to protect our digital assets. Until recently, these Internet facing systems have resided on dedicated computers that we… Read More

The lines are blurring

The legal profession, in one form or another, as existed for thousands of years. As with any activity, experience and practice helps us become more proficient, more accurate, more profound. Information security and regulatory activities are relative newcomers in the holistic picture. These pursuits also require vigilance and practice. An interesting phenomenon I believe is… Read More

Incorporation

The former Lazarus Alliance Incorporated is being reorganized as Lazarus Alliance LLC. The corporate focus will continue to be Information Security and Compliance consulting services, but, we will gradually be adding Legal services. In time, I intend on offering premiere comprehensive international services focused upon information security. Basically, Lawyers who are actually technically savvy. The… Read More

Cloud Computing, AKA SaaS

Synopsis: The effective weak link of cloud computing: An oversight by a single vendor creates a single point of failure that can have devastating effects on an untold number of its customers. Commentary: Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and… Read More

Syndication Updates for 2009-03-09

12:09am mdpeters posted 9 items. (Hide Details) Sample Information Security Program Charter: Adaptive Best Practices Policy Samples: Documents Adaptive Best Practices Policy Samples: Sample Information Systems and Technology Security Policy: Sample Information Security Program Charter: Adaptive Best Practices Policy Samples: Sample Information Security Program Charter: Sample Information Systems and Technology Security Policy: 1:20pm mdpeters posted… Read More

Syndication Updates for 2009-02-22

9:56pm mdpeters posted 170 items. (Hide Details) Impossibility Motion for change of venue—Based on publicity FN10 Witnesses testifying as to documents Preemption Motion challenging method of choosing jury Use of computer security consultants, EDP auditors, and computer professionals FN9 Motion to reduce charge Subjects of discovery; checklist Arraignment; Pleas; Continuance of Case in general Other… Read More

Policies, standards, and Guidlines, Oh My!

  My pet project for the past three years has been the Holistic Operational Readiness Security Evaluation wiki, otherwise known as the HORSE Project. In addition to some great audit guidance, security advice, tools, ect, there is a full compliment of policies to use as boilerplates for any organization. Find it all here: http://lazarusalliance.com/horsewiki/ It… Read More