Security Triangle+ People Process Technology+
As other blog posts have mentioned in the past: Schneier: https://www.schneier.com/blog/archives/2013/01/people_process.html http://www.computerweekly.com/blogs/david_lacey/2013/01/we_need_more_use_of_security_t.html Here is the “Security Triangle” People, Process, and Technology. Image from: http://www.business2community.com/online-communities/social-intranets-merging-people-process-and-technology-0126252 Even though the image above is…
Why is Security Difficult? Target Breach Analysis 2 Yrs Later
Brian Krebs does a great job reviewing the details at his latest post http://krebsonsecurity.com/2015/09/inside-target-corp-days-after-2013-breach/#more-32276 The analysis of Target’s breach is obvious in the level of insecurity in Target 2012. Default…
Cyberjokes v1.6 #CyberJoke Friday
Another compilation of Computer Jokes from the Internet http://www.ajokeaday.com/Clasificacion.asp?ID=18 Includes the following: Tech Support: “I need you to right-click on the Open Desktop.” Customer: “Ok.” Tech Support: “Did you get…
FTC-Wyndham Court Decisions Make Cybersecurity More Litigiou$
The latest story from Arstechnica: http://arstechnica.com/tech-policy/2015/08/ftc-can-sue-companies-with-poor-information-security-appeals-court-says/ Builds on the previous post: http://oversitesentry.com/courts-uphold-ftc-regulation-punishment-to-negligent-company/ Higher regulation –> higher lawsuit fees –> More costs to a breach. Wyndham had ineffective Cybersecurity and FTC…
Hackers Steal What You Allow
To anyone that pays attention Chinese hackers steal IP (Intellectual Property Theft) http://www.infosecurity-magazine.com/news/chinas-ip-theft-tech-transfer/ We can argue – is it $5trillion? or 3? My point is it does not matter, the…
