Cyber Defense: We’ve Been Doing It Backwards
The number of breaches that have occurred in the past 12 months (Target, U of MD, etc.) serve as a warning that traditional defense mechanisms are not working. I ask…
DetailsThe number of breaches that have occurred in the past 12 months (Target, U of MD, etc.) serve as a warning that traditional defense mechanisms are not working. I ask…
DetailsThere are tellers of tales and debunkers of myths. An organization needs both. An example: the March of Dimes needed people to have the vision of eradicating Polio. Its very…
DetailsOne would think that working in a very prestigious university would simplify the job of the security department. All you would have to do is tell people what was required…
DetailsYou know you’ve reached a point in your career when you get asked to give a talk on how IT has evolved over the past 10-15 years. I guess it’s a…
Details(This is the sixth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
DetailsVA Tech is one of the few institutions in the US that runs a full production, dual stack IPv4/IPv6 network. We’ve been running this dual stack network since 2005. All…
Details(This is the fifth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
DetailsCONTROL: Minimize the number of users with domain or local administrative privileges. Such users should use a separate unprivileged account for email and web browsing. This control is misunderstood and…
Details(This is the fourth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
DetailsI think that there is some confusion about the concept of privacy in a public setting. It appears to me that some people really believe that they can walk around,…
DetailsI was recently invited to speak to senior executives about traveling with electronic devices. I designed a presentation consisting of 11 slides and guessed it would take about half and…
DetailsSecurity is a word that brings up many different images depending on your experience, profession or industry. At a University, not only is the context different than at a bank,…
Details