Your Home & Your Phone: A Privacy Rights Metaphor
For simplicity, I will use the term, “organization” to refer to any party (such as an employer, corporation, state or government entity) during the following discussion. Additionally, I’ll use the...
View ArticleWhy Remote Wipe is Dumb: Part I
Recently published data indicate that the average businessperson has 3.5 such mobile devices – a laptop, a tablet or netbook and one or two cellular phones. This number has doubled in three years and,...
View ArticleWhy Remote Wipe is Dumb: Part II
OK. Let’s assume for a minute that remote wipe is on your checklist when you go shopping for a mobile security solution. You are looking for peace of mind when a mobile device gets lost or stolen or...
View ArticleInformation Security in 2020: Part I
“Just because everything is different doesn’t mean anything has changed.” The principles that motivate current approaches to securing information and the systems that store, process, & transmit...
View ArticleInformation Security in 2020: Part II
In our last post we asked a simple question: Why do data breaches still occur? In order to begin to answer this question, we need to start by looking at the state of the contemporary security scene –...
View ArticleInformation Security & Steamboat Boiler Explosions
In the U.S., safety & security almost always takes a back seat behind commerce. This historical principle is in evidence in almost any field: numerous (unfortunately) examples of this have been...
View ArticleThe Enemy: Cyber Criminals, Cyber Warriors, Hackers, & Punks
The Enemy: Cyber Criminals The list of categories of cyber crime is growing, & is, for the most part, advancing in lockstep w/ technology advances. Some of these crimes overlap, but a...
View ArticleA Concise Definition of Four Commonly Misused Security Terms
1. Information Assets (a thing): 1.1. Information assets (IA) may include database records, software code, critical company data, & other intangible items. These intangibles may include...
View Article