The Patriot Act and the Cloud
A year ago, Microsoft’s U.K. managing director surprised many people by publicly admitting that Microsoft will hand over data stored in any of its worldwide facilities when asked to do so by the U.S. government. In fact, the cloud customers and their data subjects would not even be informed if there was a gag order […]
Operation Card Shop
News outlets throughout the US reported last week about “Operation Card Shop” a series of crimes related to stolen credit card information.. The press release from the US Attorney’s Office for the Southern District of New York is titled Manhattan U.S. Attorney And FBI Assistant Director-In-Charge Announce 24 Arrests In Eight Countries As Part Of […]
Flame Authorship is Acknowledged… Now What?
Last week the Washington Post reported that “Western officials with knowledge of the effort” said that the malware called Flame had been jointly developed by the United States and Israel. The main surprise here was the announcement itself. The complexity and sophistication of the Flame malware had led researchers to conclude that it was probably […]
Let’s Get Physical
Usually when we hear the term “cybersecurity” we think of things like passwords and firewalls. We seldom think of physical security. Yet physical security is just as critical or perhaps more than passwords or firewalls: A bad actor could likely compromise a system more easily if he or she had physical access. It is far […]
Circles are Bad. OVAL is Good.
In information assurance, it is critical to have the best reporting about your vulnerabilities. Vulnerabilities, as you may recall from an earlier blog, are software flaws that may leave a system open to exploitation. There are tools that help identify and assess vulnerabilities. They are called vulnerability scanners, or VA tools. These are tools designed […]