Who Is Guilty In A Hack? The Perpetrator Or The Victim?

This article is interesting not because the hacker is convicted, but because of the reader comments at the end. The first post defends the hacker and blames AT&T for their system not being secure enough and allowing a breach. The next poster says that is akin to blaming a bank if they are robbed because their doors are not secure enough. Another poster points out that both are to blame.

Who Is Guilty In A Hack? The Perpetrator Or The Victim?2012-11-22T05:02:00-08:00

Beware Of How You Answer Audit Or Assessment Questions

If you are regulated under any of the myriad government and industry regulations from ITAR, FIPS, CLETS and PCI, to HIPAA and Red flags, the process of responding to security, integrity, and availability verification is not a simple exercise. It is more than answering questions in the positive. Polices, procedures and declarations of compliance are contracts with your company, partners, clients and government regulatory bodies. What do I mean?

Beware Of How You Answer Audit Or Assessment Questions2011-04-01T04:20:00-07:00

What Can We Learn From The Disaster In Japan?

Disasters are a horrible thing. We can only hope to never have our lives and loved ones involved first hand. But disasters do happen and almost all of us will experience the pain and misery ourselves at different points in our lives. The key is to mitigate the loss and pain through careful preparation. During a disaster our first concern will be for the safety and protection of those closest to us. Once that is secured, we will all begin the transition back to normal life and work.

I have had many tell me that in a disaster they are not going to care about their servers and the PCs at the office. That is true however, at some point, normal life must return. So how do you do that? You must have a disaster recovery plan in place. It must have several components:

What Can We Learn From The Disaster In Japan?2011-03-15T00:58:00-07:00