Security Blunder at the World Cup

2014-world-cup-logo

One of the simplest steps to bolstering cybersecurity is employing caution and complexity vis-à-vis passwords. Good passwords cannot be found in the dictionary; good passwords do not consist of only letters or only numbers; good passwords do not get shared with friends and family. Good passwords also do not get Tweeted. So it came as […]

Georgia Institute of Technology Wins for Innovative Crowdsourcing Disaster Relief System

gatech_logo

Note: We believe the release below will be of high interest to technologists in the national security, law enforcement and first responder fields. From: http://ctolink.us/1pjzGOn Disaster Relief Crowdsourcing Project At SoftwareAG’s Innovation World 2014 Software AG’s University Relations department has announced the winner of the first international student idea contest for the company’s Innovation World customer […]

Overcoming the Equation: Security = Friction

blueprint-close_00339844

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Wait, that might be vulnerable to a comic book dictionary attack (bonus points for Superman fans), so let’s add some numbers and special characters: M4xyZ!ptL#K. Not bad, but suppose policy requires 12 or more characters; we have to pad the password: […]

InfoSec Policies and Standards: Some strategic context for those just diving into this world

infosec1

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. So an organization makes different strategies in implementing a security policy successfully. An information […]

Identity Based Internet Protocol (IBIP): A network security innovation developed at The MITRE Corporation

computer-networking-tips

Editor’s note: I’ve referenced before my participation on the board of  Centripetal Networks, and their ability to deliver large scale commercial solutions of MITRE’s IBIP are an area I am particularly proud of. – bg Over the last several years The MITRE Corporation has published pieces about their development of enhanced security protocols in the construct of […]

Live Data Breach Webinar Featuring Dave Shackleford

dave-shackleford

Widely known security practitioner Dave Schackleford is presenting a webinar on Thursday 15 may at 2pm Eastern that should be of high interest to any enterprise technologist seeking to understand the dynamics of the modern data breach. The following is from the invitation: You’re a target for data breach. You may not have realized it, […]