The InfoSec Blog

The InfoSec Blog

System Integrity: Context Is Everything

  • About The Author
  • Master Index
  • Presentations
  • System Integrity

Category: Crime

December 1, 2009

The wedge gets thicker

http://news.cnet.com/8301-1009_3-10405824-83.html http://news.zdnet.co.uk/communications/0,1000000085,39909136,00.htm http://community.zdnet.co.uk/blog/0,1000000567,10014530o-2000331761b,00.htm The thin edge of the wedge was when pubs were fined or letting patrons get drunk, drunk enough that they shouldn’t…

November 6, 2009

Speil Chequers

Yesterday, my friend and collegue, Rob Slade, noted that … Idly leafing through yet another IT executive rag (preparatory to recycling it), and noticed…

September 9, 2009

Judges Punish Wall Street as Regulators Just Talk About Reform

http://www.bloomberg.com/apps/news?pid=20601109&sid=a5wZ95KdSuJQ This is something we should *ALL* be aware off, not least those that think legal and world economic stuff is off topic. We…

August 30, 2009

Online Cyberlaw programs

People occasionally ask about InfoSec courses that cover law and cyberlaw and about schools that offer cyberlaw programs. I’m curious about this whole thing…

August 3, 2009

Significant Impact Calculation in Business Risk

My colleague Gary Hinson made the following observation on the ISO 27001 list in August: There are numerous assumptions and estimations in the risk…

July 29, 2009

419 scammers using Dilbert.com

http://blogs.zdnet.com/security/?p=3809&tag=nl.e539 Oh, the ignominy! On their way to search for clean IPs through which to send out yet another scam email, 419 con-artists (Mrs…

April 23, 2009

Politician hit by lost documents

http://www.manchestereveningnews.co.uk/news/s/1109560_burnham_sorry_over_security_blunder We can all see what went wrong here. 1. He should have gone by car and not the train. 2. He should have…

March 28, 2009

Would Bill C-285 outlaw BlackBerry in Canada?

http://www.itworldcanada.com/a/Daily-News/03b813a2-f13b-4c3e-9494-ae9064f25da3.html “When they outlaw X only criminals will have X” … for many values of the members of the set of Y. There’s the…

March 2, 2009

Small firms are taking fraud protection too lightly, says Visa Canada

  Forty-one percent of small businesses surveyed by Visa Canada said they don’t believe data thieves and hackers will target them because of their…

December 1, 2008

Stolen laptop leads to drug bust

So when I see a laptop valued at $9,000 I get to wonder. If this hadn’t been recovered and the owner tried to claim that amount on his insurance policy I wonder what the reaction of the insurance company would have been.

November 11, 2008

Going Rogue

In this article at TechRepublic, Tom Olzak tries to address the issue of insider threat by talking about why your employees might ‘go rogue’. …

November 10, 2008

Cyber-terrorism will be punishable by death

http://www.dailytimes.com.pk/default.asp?page=2008\117\story_7-11-2008_pg1_8 Only in Pakistan? Shame! The penalty is limited to an offence that ‘causes death of any person’, according to the ordinance that will…

August 22, 2008

Billion and Billions.

No, not a Google its a Sagan! I’m sure that like me you get mails that read something like From:Mr.John Lewis Phone No: 44-702…

July 19, 2008

Why San Francisco’s network admin went rogue

http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/08/07/18/30FE-sf-network-lockout_1.html To an auditor or anyone with security training this screams of a security risk. One critical guy who has no backup. private and…

July 15, 2008

Motive isn’t necessary to convict

http://government.zdnet.com/?p=3874 There’s an old joke about a man brought before the court for breaking and entering, not because he was caught in the commission…

September 28, 2007

Why I don’t see the need for elaborate Risk Analysis

http://www.informationweek.com/news/showArticle.jhtml?articleID=202101781 Convicted hacker Robert Moore, who is set to go to federal prison this week, says breaking into 15 telecommunications companies and hundreds of…

January 1, 2007

2006: The Year of the laptop … stolen that is

When did you last secure your laptop? The last year seems to have been a bumper one for stolen laptops, especially ones stolen from…

December 11, 2006

What exploitation of “Child Labour”?

http://news.bbc.co.uk/1/hi/technology/6220416.stm We’ve seen the reports in the glossy weeklies about the revolutionaries in Africa recruiting young children. Our Western sensibilities are offended by this…

Posts navigation

Previous 1 2

Availability

I am currently available to offer InfoSec & GRC audit and consulting services through my company - System Integrity

Popular Pages

  • The Classical Risk Equation
  • Separation of Duties: Infosec, IT and Audit
  • “Cybercrime” is still Crime and “Cyberfraud” is still Fraud
  • Risk Analysis makes no sense … Does it?
  • Are *you* ready to give up yet?
  • Why InfoSec Positions go unfilled
  • Security
  • Risk
  • ISO27K
  • Rants and Raves

Categories

Archives

Calendar of Posts

June 2022
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Sep    

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Security Links

  • Schneier on Security
  • Gary Hinson
  • Martin McKeay
  • The Security Team
  • DHS Daily Report
  • SANS Security Alerts
  • Brian Krebs
  • Stupid Security
  • Kill-HUP.com
  • Bruce Schneier
Copyright The InfoSec Blog. All rights reserved. | Powered by WordPress & Writers Blogily Theme