An article I read on ZDNet this week laments that fact that politicians as a group are woefully clueless about technology issues, yet keep pressing ahead with projects that are highly dependent on technology such as National ID programs. As some of the...
One of the hardest concepts to emphasize concerning Information Security is that people and processes are more critical to your overall security posture than products are. That is not to say that products are unimportant. Certainly, any deficiency in one of the...
There is no universal standard of what the acceptable boundaries of privacy are. The European Union tends to have a more stringent view of what constitutes personal privacy, while the United States seems to favor corporations vs people when it comes to...
Over the past few days, I have seen at least two posts or articles on a subject I’ve been meaning to write about for quite some time, now. The first one I saw was by Rob Howard, and although it deals mostly with software development, it struck a chord with me. ...
It is very easy to become complacent with Information Security on a home computer or network, even for those who would otherwise preach IT Security in a corporate setting. There are several reasons why this attitude can develop, even in people whose line of work...
Five years ago, I wrote an article on the challenges of implementing Information Security in an enterprise. Sad to say, even in the post-911 era, not a whole lot has changed there. Sometime in the next couple weeks, I’ll write an updated...