Good Time to Evaluate Patch Management

Interesting to note tomorrow is 2 weeks from Patch Tuesday November 11th (2nd Tuesday of month) and 2 weeks from patch Tuesday in December (the 9th). So it is a perfect time for reflection – thus we review a discussion of the November 2014 patch Tuesday  in SecurityWeek. It means to give direction for companies that … Read more

Free Public Databases – Should they be used at all?

Internet Storm Center has a post today noting the update to Burp Suite an excellent vulnerability analysis of Websites as a proxy server. While checking the update the storm center noted the inclusion of NoSQL injection  in the update. At the same time why is this important? because of the prevalence  of public databases or “Bigdata” … Read more

Encrypting Laptop Files: Legal effects

Interesting Defcon17 (an attorney gave a talk in this video): This Defcon presentation is all about Constitutional rights on your computers.   Also the following webpage  at Cnet.com   When one thinks someone want to read their laptop content, and then encrypt the data, that may not be enough to prevent the government whose border … Read more

Digital Security in Risk Assessment

As time goes on your risk assessment needs to be re-evaluated, especially as computer resources change. If we had a crystal ball what would the future bring?   It is lucky there are smart people thinking about this very issue.  In the following Youtube video about a discussion with Dr. Mchio Kaku at St. Petersburg … Read more

What is Risk level regarding IT Security concerns?

How does IT Security rank with respect to other company risks? There are always risks in life for individuals, and so there are risks for companies  as well. In IT risk revolves around data protection (Denial of Service as well as network or equipment failures), continuity of service, preventing IT security breaches, PC life cycle … Read more