Free Public Databases – Should they be used at all?

Internet Storm Center has a post today noting the update to Burp Suite an excellent vulnerability analysis of Websites as a proxy server. While checking the update the storm center noted the inclusion of NoSQL injection  in the update. At the same time why is this important? because of the prevalence  of public databases or “Bigdata” … Read more

Encrypting Laptop Files: Legal effects

Interesting Defcon17 (an attorney gave a talk in this video): This Defcon presentation is all about Constitutional rights on your computers.   Also the following webpage  at Cnet.com   When one thinks someone want to read their laptop content, and then encrypt the data, that may not be enough to prevent the government whose border … Read more

Digital Security in Risk Assessment

As time goes on your risk assessment needs to be re-evaluated, especially as computer resources change. If we had a crystal ball what would the future bring?   It is lucky there are smart people thinking about this very issue.  In the following Youtube video about a discussion with Dr. Mchio Kaku at St. Petersburg … Read more

What is Risk level regarding IT Security concerns?

How does IT Security rank with respect to other company risks? There are always risks in life for individuals, and so there are risks for companies  as well. In IT risk revolves around data protection (Denial of Service as well as network or equipment failures), continuity of service, preventing IT security breaches, PC life cycle … Read more

My IT is outsourced – I don’t worry about security

Recently I had a discussion with an executive, and he said he outsourced his IT functions, so I don’t have to worry about it anymore.  Is that right? So i searched for a theoretical talk… —————————————————————————————————————————- Black hat 2014 had several talks about Cyberspace security – Jason Healy discussed how to save Cyberspace SEP = … Read more