Welcome to The UltraTech Zone Sign in | Join | Help

Talking Out Loud with ASB

Views on Life, Technology and Everything, by ASB (aka Logik!)...

My Profile

Andrew S. Baker (ASB)

News

  • Platform: CS v2.1 SP2...

    Get a FREE phishing filter for your domain!

    Who links to my website?

    Pando Pro

Browse by Tags

All Tags » Security   (RSS)

Enhancing My WLAN with a Meraki MR12
I finally got a chance to deploy a Meraki MR12 wireless access point . These are some sweet devices.  I wasn’t that happy with the PoE brick that it comes with for power, but getting it setup has been quite pleasant. As an enterprise device, it supports Read More...
Reading Between the Lines of Breach Notifications
Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing Read More...
Get Real with Information Security
In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this Read More...
Why We Have No Online Privacy
Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation , it became very clear to me why online privacy in the US is almost entirely non-existent. As a society in the Read More...
Securing Your Storage - Part 1
If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure.  Unless you are absolutely, positively certain that you will never, ever put anything in there that you wouldn’t want to find in a public place, Read More...
Managing Your Personal Security
In the past few days, we learned that Global Payments Inc, a middle-man credit checking company, suffered a breach of its systems starting in January of this year .  It has been speculated that up to 10 million card holders might be at risk. Even Read More...
The Privacy and Security Implications of Misusing Technology
If you haven’t already heard of Carrier IQ , you need to do some serious web searching, as they are swiftly becoming the new name in technology misuse on a massive scale. Over 6 years ago, Sony installed a rootkit with their music software in the name Read More...
Effectively Managing Risk
Despite the significant uptick in information security events on display thus far in 2011, and despite the diversity and caliber of organizations that are being breached, it seems that too many organizations are failing to learn the lessons of the victims. Read More...
To Disclose or not to Disclose
…that is the question. Every time a software vendor experiences a vulnerability or releases patches for a serious security issue, the debate about Full Disclosure or Responsible Disclosure gains a little more steam. Just how much information should a Read More...
Just ask Sony…
Why should you take your organization’s information security posture seriously? Just ask Sony.  It has been estimated that Sony will spend more than $170 million dollars due to the recent breaches they have suffered.  Personally, I think that Read More...
Managing Technology-based Risks
Risks exist. You would think that this is so obvious as to not need saying, but too many people appear to operate as though downplaying or ignoring risks have any impact on their reality. That sign announcing “bridge out” isn’t really concerned with how Read More...
Reactive Security: Feel the pain in 2011+
We are only one third of the way into 2011, but we have had some of the largest information security breaches of the decade – and the trend does not appear to be slowing down. Here are just a few of the biggest reports for the year: http://www.eweek.com/c/a/Security/RSA-SecurID-Breach-Shows-Why-Everybody-Must-Stay-Vigilant-595858/ Read More...
Maintaining Good Security Practices
Security is not just a state of being. We are often called to provide an assessment about our present security posture, and usually, the person asking the question is doing so within a very narrow context – one that the may or may not have shared with Read More...
The State of Data Breaches in 2010
I had a chance to review the 2010 Verizon Data Breach Report today, which I was alerted to by ISC.SANS.ORG .  They’ve put together data from 2004 through 2009, and it is quite interesting. These are from confirmed data breach cases. Here were 3 of Read More...
Lessons from 2009: Functionality still trumps Security
Yes, you heard me correctly… We still think about personal and corporate security only as an afterthought. Despite all the regulatory and industry compliance that has been created and updated in the past 15 years, as we close out this decade, we are hardly Read More...
More Posts Next page »