Federal Laws May Affect Cybersecurity Legal
Security Magazine has the story: http://www.securitymagazine.com/articles/86057-understanding-the-new-federal-cyber-laws The CEA(Cybersecurity Enhancement Act 2014) is the most significant of the December bills both in breadth and likely in significance. Where NIST(National Institute of…
Vulnerabilities Can Be Exploited
(Sunday reflections and current news) Specifically the Seagate NAS Business Storage Line Today’s Internet Storm Center has the story. This is the method the attackers can use to hack the…
Exploit Home Routers Then Pharm DNS servers
Yes another slightly new style of attack: http://www.networkworld.com/article/2889933/hackers-exploit-router-flaws-in-unusual-pharming-attack.html There are a couple of slightly new twists in this hacker style attack. Proofpoint found the attack (as a spam protection company…
How do we improve Security?
We need a Renaissance of focus on Security. I’m a Systems Engineer (http://www.fixvirus.com/about-us-full-story/) and teacher of Security Architecture (SEC020 at Professional Education Technology & Leadership Center at Washington university in…
PCI Compliance Also on Cloud?
What about “PCI Compliance on Cloud?” There _is_ a document by the Payment Card Industry (PCI) SSC(Security Standards Council) website https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_Cloud_Guidelines.pdf Notice this is a v2(Feb 2013) document of the…
