The following appeared in the Canadian online magazine Security Matters: Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess Everywhere you look, retailers and other entities are offering to... Read More
In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security. Here is the write-up and recap of the event: Talk2Cisco . I took a moment and watched the video, and... Read More
No doubt you are aware of the tragic loss of life which occurred in Cooperstown, North Dakota late last week, when 16 year old Cassidy Joy Andel, posted a disquieting message upon her Facebook page, “My time has come, and... Read More
By Christopher Burgess Do you work for an enterprise or a small-to-medium-size business? If so, odds are you have an information technology department supporting you. If you work for yourself, you may leverage the knowledge of others in cobbling together... Read More
By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing... Read More
On 15 September, the House Subcommittee on Crime, Terrorism and Homeland Security conducted a hearing on “Domestic Minor Sex Trafficking” in the United States. (NB: A minor in the United States is an individual under the age of 18.) On ongoing issue in... Read More
The recent suicide by Rutgers University freshman Tyler Clementi is a horrific tragedy on so many levels. As I noted in my prior pieces on cyber bullying, tolerance and respect are sorely lacking in today’s society. This situation is further amplified by our... Read More
Today marks the beginning of National Cyber Security Awareness Month in the United States. I urge you to take a moment each day to educate yourself, your family, your colleagues on the need to be vigilant, proactive and engaged with... Read More
I recently spoke at an event in Seattle on the security aspects of Social Media, both from the business and personal perspective. One question which I fielded surrounded whether or not there is risk to children via the various social... Read More
The US unemployment numbers were released earlier this week and they remained high, at almost 10% and higher in some locales. Indicative of large numbers of the population continue to find employment. Often times an attractive situation isn’t geographically near and relocation isn’t... Read More
As 2009 races to a close, two terms have become permanent residents within the online safety and security lexicon, “identity theft” and “identity fraud.” The reality is both have existed long before the internet came into being and today as... Read More
We all have a reputation. When you were young, you may have been known as the “ultra-smart” student or the one who wore “keds” or perhaps the “bratty one” or the “swimmer” – all labels. And as we matured the... Read More
Today I share with you a piece I wrote in the beginning of November as a guest blog for Cammie Moises and her MomsMaterial blog. The content I believe is apropos for your families and friends who may be online. ... Read More
This is a continuation of the expansion on the daily tweets I shared via my Twitter account, @BurgessCT, during National CyberSecurity Awareness Month (#NCSAM – October 2009). If you’re reading this blog, you and your family are connected to the internet;... Read More
Today ends the 2009 edition of National Cyber Security Awareness Month (NSCAM). Throughout the month, I and many others have been posting guides, tips and advice on how to stay safe online and how to keep the online experience a... Read More
Cyberstalking – does it really exist? Yes, it exists. Is it a new phenomena, lamentably no. Cyberstalking has been a factor for more than 10 years and is the unfortunate natural extension of physical stalking and in some cases has... Read More
This is the first blog from within the veritate et virtute domain.It is fitting, therefore, this particular post revolve around a topic which continues to provide challenges to legislators both in the United States, as well as elsewhere around this... Read More
The guide is a professional guide, with exemplars which can be used in a sandbox, or to assist you in noodling through specific infrastructure monitoring issues - such as "tuning" so the incident logs tell you the story, and don't... Read More