IoT Security – I Know What Will Help – Get Congress Involved

The U.S. House Energy and Commerce Committee held hearings on November 16, 2016  on security of Internet of Things in the wake of the massive distributed denial of service (DDoS) attacks perpetrated against certain network DNS servers via a host of unsecured IoT devices.  So, what’s a government to do? That is, not what SHOULD…

Details

Failure to Secure – No Harm, No Foul?

If a tree falls in the forest and there is nobody there to hear it, does it make a sound?? If a company has a data security event exposing sensitive data, but nobody is harmed by the exposure, is it a violation of the law?  A recent case from a federal appeals court in Atlanta LabMD…

Details

Brexit’s Potential Impact on Information Security

One of the lessons of crisis management is that you don’t make predictions during a crisis.  Not to say that the recent UK vote to leave the EU (“Brexit”) is a crisis per se, but just that it is a period of uncertainty.  So what impact will Brexit have on data security, privacy, governance, and…

Details

Virginia Court Kills Privacy

A federal court in Virginia on June 23 may have put the final stake in the heart of constitutionally protected privacy rights online. The case itself was simple enough – in an effort to investigate the murky and disreputable “business” of sharing of child pornography on the Dark Web that is accessible mostly through TOR…

Details

Inside(r) Job

In 1981, R. Foster Winans was a reporter for the Wall Street Journal, writing the “Heard it on the Street” column.  As a diligent reporter, he would find out information about companies, and then publish this information in the Journal. He wasn’t an “insider” of any company except the company that owned the Journal.  When…

Details

Encryption as Protection? Maybe Not

A recent espionage prosecution in West Palm Beach, Florida demonstrates that encryption may not be the panacea that organizations think it is.  So rather than relying on encryption alone, companies need to adopt and maintain strategies that continue to provide layered security. After every data breach, we hear the same mantra, “If only the data…

Details