Posts Tagged ‘corporate governance’

Judge Rules USA PATRIOT Act Breaks Separation of Powers Requirements

Thursday, September 6th, 2007

There was some very interesting news in the Kansas City Star today; “Judge strikes down part of Patriot Act

(more…)

Judge Rules USA PATRIOT Act Breaks Separation of Powers Requirements

Thursday, September 6th, 2007

There was some very interesting news in the Kansas City Star today; “Judge strikes down part of Patriot Act

(more…)

Privacy Not Only Requires Securing PII, It Also Requires Keeping the Trust of Your Customers

Tuesday, July 10th, 2007

Recently I was speaking with a client about a new Internet e-commerce application they were testing, and I asked them to give a demonstration. One of the questions I asked while watching was whether there were any ways in which someone could get information about customers’ orders. After doing some various tests, a screen popped up showing a database of names, item descriptions, and other information related to the orders. The billing information, such as credit card number, was *NOT* within this database, but the names and mailing addresses were; these were used for the indexing links to the database.

(more…)

Improve Security to Make the Planet Greener

Monday, July 9th, 2007

This weekend there was a lot of attention on the environmental crisis facing the planet. There was the Live Earth concert on 07/07/07. Tonight the news was filled with more talk of new laws and initiatives, such as banning bottled water in restaurants in some of the states.

(more…)

07/07/07! Lucky for Cybercriminals?

Saturday, July 7th, 2007

I’ve always been fascinated with numbers. Math has always been fun, and one of my degrees is in math. I’ve never really studied numerology, but today’s date, 07/07/07, only happens once each century, and it is interesting to see how many people are celebrating it in various ways.

(more…)

Having Backup Services Is Invaluable

Friday, July 6th, 2007

I love my dialup! Yes, I mean dialup Internet connection. I’ve been on a broadband wireless connection via a satellite on my roof for a little over a year, but I kept my dialup account just in case I ever needed a backup. Today I needed a backup.

(more…)

Laws, Standards, Mapping, and HIPAA

Friday, June 22nd, 2007

Today is the last day of Norwich University’s Masters programs residency week; this afternoon is graduation.
It has been a great week…I have loved chatting with the students and faculty, and I’ve compiled a page full of topics I want to research and blog about!

(more…)

Greetings from Arizona!

Tuesday, June 12th, 2007

Is it Tuesday already? I’ve lost track of the days…I’ve been here at the CSI NetSec conference since Friday, giving Chris Grillo’s and my “Handling Complex and Difficult Information Security and Privacy Issues” pre-conference seminar on Saturday and Sunday.
We had 16 outstanding participants from a wide range of industries, including government, technology, and retail, just to name a few. I love having this variety; it leads to very good discussions and increased understanding of what information assurance practitioners are dealing with. Thanks again to those of you who attended; your interaction was fantastic!

(more…)

“Getting Tough” With Information Security Is Really Just Getting Smart

Tuesday, June 5th, 2007

Today I saw the headline, “Energy gets tough on laptop use” in Government Computer News and I was curious to see that the story was about how the U.S. Department of Energy (DOE) is going to start actually enforcing their security practices by accurately inventorying and tracking their mobile computing devices after having “lost” 1,415 laptops in the past 6 years. The DOE also indicates they are going to start enforcing their security policies and procedures.

(more…)

New Information Security and Cybercrime Initiatives Planned in the EU

Monday, June 4th, 2007

As cybercrime continues to occur in more varied ways, as more incidents are reported every day, as new threats emerge, as more vulnerabilities are found within software and systems, often within those products that companies buy to improve security, the more bills, plans, initiatives and laws that emerge worldwide to address these issues.

(more…)