January 30, 2012 IT Pros Believe Data Breach Harm Assessment Is More Valuable Than Victim Notification http://www.pcworld.com/businesscenter/article/248724/it_pros_believe_data_breach_harm_assessment_is_more_valuable_than_victim_notification_study_says.html Valuable to whom? If we can learn from the mistakes of others, if they will freely disclose that they have been breached, the…
January 25, 2012 “Cybercrime” is still Crime and “Cyberfraud” is still Fraud http://www.techsecuritytoday.com/index.php/our-contributors/michael-vizard/entry/lifting-the-veil-on-cybercrime This says it all: At the end of the day, cybercriminal activity is not all that different from more traditional forms of organized…
January 24, 2012 The Death of Antivirus Software http://www.infosecisland.com/blogview/19386-The-Death-of-Antivirus-Software.html The real issue here isn’t Ubuntu, or any other form of Linux. Its that AV software doesn’t work. PERIOD. There are over 50,000…
January 19, 2012 â€My dog knows you don’t look like me” http://www.zdnet.com/blog/identity/darpa-authentication-project-focuses-on-humans-as-secrets/157 So do my cats. But so what? Does this mean that DARPA/USGov will finance the supply of advanced biometrics with every PC from…
January 17, 2012 How to decide on what DVD backup software to use You do do backups don’t you? Backups to DVD is easy, but what software to use? – How are you managing the backup archives?…