Posts filed under: Blog

Transparency International measures global corruption

Critics say the NGO's Corruption Perceptions Index conveys an 'elite bias' and doesn't show evidence of actual corruption... Read More

Data breaches in healthcare – The UW data breach

Data breach at the University of Washington – October 2013 In early October 2013 a University of Washington Medicine (UW Medicine) employee opened an email attachment and in doing so launched a piece of malicious software (aka *malware*). The employee’s... Read More

Iranian nuclear accord deserving of skepticism or buying diplomatic space?

White House courts critics as president seeks support for nuclear deal with Iran with a flurry of phone calls to foreign allies... Read More

Nation States’ Espionage and Counterespionage – An overview of the Economic Espionage landscape of 2007

  Though we are mid-way through 2013, I refer to a study I wrote in 2008 as it contains many data points applicable today.  In 2008 I published via CSO Online a study on the Economic Espionage landscape of 2007,... Read More

China’s intellectual property advance

Prevendra’s Christopher Burgess posted a piece on China in the Huffington Post – China’s Military – Here we are!, which noted how the People’s Republic of China (PRC) has been eating the West’s intellectual property lunch for the past 25+... Read More

Defining the causes of a data breach

I recently crafted a piece for Huffington Post, What’s a data breach, in which I defined the vagaries of the different types of causes of a data breach.  While I list the different types, I welcome opinion on others, and... Read More

Big Data Security is a must have

“Secure the data!” That’s the claxon call which every chief security officer (CSO) or chief information security officer (CISO) hears 24/7/365 coming from their CEO, their customers and their partners. In the 12th century AD, the methodology of choice to... Read More

Prevendra: U.S. National Industrial Security – NISPOM Training Requirement

For U.S. Defense Contractors, the National Industrial Security Program Operating Manual (NISPOM) is the bible of process, procedure and how things are accomplished for every contractor.  Additionally, every cleared employee must be provided security training.  And you the contractor or... Read More

Security – Who is responsible?

Do you view your security posture in the office as more or less important in comparison to your residence? And how does that compare to the personal security profile that you exercise for you and your family? Who should be... Read More