Good Time to Evaluate Patch Management

Interesting to note tomorrow is 2 weeks from Patch Tuesday November 11th (2nd Tuesday of month) and 2 weeks from patch Tuesday in December (the 9th). So it is a perfect time for reflection – thus we review a discussion of the November 2014 patch Tuesday  in SecurityWeek. It means to give direction for companies that … Read more

Free Public Databases – Should they be used at all?

Internet Storm Center has a post today noting the update to Burp Suite an excellent vulnerability analysis of Websites as a proxy server. While checking the update the storm center noted the inclusion of NoSQL injection  in the update. At the same time why is this important? because of the prevalence  of public databases or “Bigdata” … Read more

Encrypting Laptop Files: Legal effects

Interesting Defcon17 (an attorney gave a talk in this video): This Defcon presentation is all about Constitutional rights on your computers.   Also the following webpage  at Cnet.com   When one thinks someone want to read their laptop content, and then encrypt the data, that may not be enough to prevent the government whose border … Read more

Digital Security in Risk Assessment

As time goes on your risk assessment needs to be re-evaluated, especially as computer resources change. If we had a crystal ball what would the future bring?   It is lucky there are smart people thinking about this very issue.  In the following Youtube video about a discussion with Dr. Mchio Kaku at St. Petersburg … Read more