Quantcast
Channel: Battle Magic Security » Threats
Browsing all 8 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Your Home & Your Phone: A Privacy Rights Metaphor

For simplicity, I will use the term, “organization” to refer to any party (such as an employer, corporation, state or government entity) during the following discussion. Additionally, I’ll use the...

View Article



Image may be NSFW.
Clik here to view.

Why Remote Wipe is Dumb: Part I

Recently published data indicate that the average businessperson has 3.5 such mobile devices – a laptop, a tablet or netbook and one or two cellular phones. This number has doubled in three years and,...

View Article

Image may be NSFW.
Clik here to view.

Why Remote Wipe is Dumb: Part II

OK. Let’s assume for a minute that remote wipe is on your checklist when you go shopping for a mobile security solution. You are looking for peace of mind when a mobile device gets lost or stolen or...

View Article

Image may be NSFW.
Clik here to view.

Information Security in 2020: Part I

“Just because everything is different doesn’t mean anything has changed.”   The principles that motivate current approaches to securing information and the systems that store, process, & transmit...

View Article

Image may be NSFW.
Clik here to view.

Information Security in 2020: Part II

In our last post we asked a simple question: Why do data breaches still occur? In order to begin to answer this question, we need to start by looking at the state of the contemporary security scene –...

View Article


Image may be NSFW.
Clik here to view.

Information Security & Steamboat Boiler Explosions

In the U.S., safety & security almost always takes a back seat behind commerce. This historical principle is in evidence in almost any field: numerous (unfortunately) examples of this have been...

View Article

Image may be NSFW.
Clik here to view.

The Enemy: Cyber Criminals, Cyber Warriors, Hackers, & Punks

The Enemy: Cyber Criminals The list of categories of cyber crime is growing, & is, for the most part, advancing in lockstep w/ technology advances. Some of these crimes overlap, but a...

View Article

A Concise Definition of Four Commonly Misused Security Terms

1.     Information Assets (a thing): 1.1.   Information assets (IA) may include database records, software code, critical company data, & other intangible items.  These intangibles may include...

View Article

Browsing all 8 articles
Browse latest View live




Latest Images