Operation Card Shop
News outlets throughout the US reported last week about “Operation Card Shop” a series of crimes related to stolen credit card information.. The press release from the US Attorney’s Office for the Southern District of New York is titled Manhattan U.S. Attorney And FBI Assistant Director-In-Charge Announce 24 Arrests In Eight Countries As Part Of […]
Flame Authorship is Acknowledged… Now What?
Last week the Washington Post reported that “Western officials with knowledge of the effort” said that the malware called Flame had been jointly developed by the United States and Israel. The main surprise here was the announcement itself. The complexity and sophistication of the Flame malware had led researchers to conclude that it was probably […]
Let’s Get Physical
Usually when we hear the term “cybersecurity” we think of things like passwords and firewalls. We seldom think of physical security. Yet physical security is just as critical or perhaps more than passwords or firewalls: A bad actor could likely compromise a system more easily if he or she had physical access. It is far […]
Circles are Bad. OVAL is Good.
In information assurance, it is critical to have the best reporting about your vulnerabilities. Vulnerabilities, as you may recall from an earlier blog, are software flaws that may leave a system open to exploitation. There are tools that help identify and assess vulnerabilities. They are called vulnerability scanners, or VA tools. These are tools designed […]
Can You Get Cyber Insurance for Cloud Computing?
A recent Business Insurance article addressed the applicability of cyber risk insurance to cloud computing. The article concludes that existing cybersecurity insurance policies are generally written in language broad enough to include cloud services under the category of outsourcing. Cybersecurity insurance is an important thing to consider, because cloud providers accept little to no liability. […]