Operation Card Shop
Jul 3, 2012
News outlets throughout the US reported last week about “Operation Card Shop” a series of crimes related to stolen credit card information.. The press release from the US Attorney’s Office for the Southern District of New York is titled Manhattan U.S. Attorney And FBI Assistant Director-In-Charge Announce 24 Arrests In Eight Countries As Part Of […]
Flame Authorship is Acknowledged… Now What?
Jul 2, 2012
Last week the Washington Post reported that “Western officials with knowledge of the effort” said that the malware called Flame had been jointly developed by the United States and Israel. The main surprise here was the announcement itself. The complexity and sophistication of the Flame malware had led researchers to conclude that it was probably […]
Let’s Get Physical
Jun 27, 2012
Usually when we hear the term “cybersecurity” we think of things like passwords and firewalls. We seldom think of physical security. Yet physical security is just as critical or perhaps more than passwords or firewalls: A bad actor could likely compromise a system more easily if he or she had physical access. It is far […]
Circles are Bad. OVAL is Good.
Jun 26, 2012
In information assurance, it is critical to have the best reporting about your vulnerabilities. Vulnerabilities, as you may recall from an earlier blog, are software flaws that may leave a system open to exploitation. There are tools that help identify and assess vulnerabilities. They are called vulnerability scanners, or VA tools. These are tools designed […]
Can You Get Cyber Insurance for Cloud Computing?
Jun 25, 2012
A recent Business Insurance article addressed the applicability of cyber risk insurance to cloud computing. The article concludes that existing cybersecurity insurance policies are generally written in language broad enough to include cloud services under the category of outsourcing. Cybersecurity insurance is an important thing to consider, because cloud providers accept little to no liability. […]