Data breach at the University of Washington – October 2013 In early October 2013 a University of Washington Medicine (UW Medicine) employee opened an email attachment and in doing so launched a piece of malicious software (aka *malware*). The employee’s... Read More
Though we are mid-way through 2013, I refer to a study I wrote in 2008 as it contains many data points applicable today. In 2008 I published via CSO Online a study on the Economic Espionage landscape of 2007,... Read More
Prevendra’s Christopher Burgess posted a piece on China in the Huffington Post – China’s Military – Here we are!, which noted how the People’s Republic of China (PRC) has been eating the West’s intellectual property lunch for the past 25+... Read More
I recently crafted a piece for Huffington Post, What’s a data breach, in which I defined the vagaries of the different types of causes of a data breach. While I list the different types, I welcome opinion on others, and... Read More
“Secure the data!” That’s the claxon call which every chief security officer (CSO) or chief information security officer (CISO) hears 24/7/365 coming from their CEO, their customers and their partners. In the 12th century AD, the methodology of choice to... Read More
For U.S. Defense Contractors, the National Industrial Security Program Operating Manual (NISPOM) is the bible of process, procedure and how things are accomplished for every contractor. Additionally, every cleared employee must be provided security training. And you the contractor or... Read More
Do you view your security posture in the office as more or less important in comparison to your residence? And how does that compare to the personal security profile that you exercise for you and your family? Who should be... Read More