Choosing a data loss prevention solution

Data security is not one-size fits all. For example, if the threat scenario is an attack on your customer self-service Web application – obfuscating or encrypting fields in database tables is not an effective security countermeasure;  you need a network DLP solution to prevent leaks of clear text data and a software security assessment that […]

Ethics and data loss prevention

Are we loving  the attackers and prosecuting the victims? In data security – I don’t subscribe to utilitarian ethics (which attempts to balance the benefit versus the damage of an act) and can lead to the ends justifying the means. For data security and compliance – I personally implement the “Ten commandments” approach – if […]

World fusion

Songlines Magazine,which specializes in world music reviewed the latest album from BandOrient- led by Yair Dalal and Eli Benacot (Eli is the musical director of the JP Big Band – where I play tenor and clarinet and serve as the contractor).  The group are amazing musicians – Yair is one of the world’s best oud […]

Reducing risk of major data loss events

Martin Hellman (of Diffie Hellman) fame maintains the Nuclear Risk web site and has written a very insightful piece on risk analysis of nuclear war entitled Soaring, cryptography and nuclear weapons Hellman proposes that we need a  third state scenario (instead current state – > nuclear war) where the risk of nuclear holocaust has been […]

N Digital TV data breach in Poland

Polish digital TV broadcaster N (owned by ITI Neovision) has disclosed a breach of customer data records – after PII was discovered accidentally on the Net by a subscriber via a search engine. The partner who manages our offices in Warsaw (the team specializes in high end data security consulting and DLP projects in Central […]

Peer support for care givers

It’s the 9th Jahrzeit (annual anniversary) of my Mom’s passing away at age 76 from MSA (multiple system atrophy). There is a lot I can and probably should write about this but there’s no way back once you get MSA. My Mom was clear of mind but almost unable to speak properly towards the end […]

Data security – is psychology more important than technology?

We had a discussion with a prospect for a DLP (data loss prevention) system) that started with discussing the pros and cons of various DLP solutions (Verdasys, Mcafee DLP, Websense, Fidelis Security) and finished with a drill-down into how they can build a business case to acquire and implement data security technology. After a very […]

Physical security in Afghanistan

If you thought that working in high-tech  is  rough – just consider how tough it is to be a musician in Afghanistan. JALALABAD, Afghanistan (Reuters) – Taliban fighters beat musicians, shaved their heads and left them tied to trees overnight because they performed at an Afghan wedding, a village tribal chief said Monday, a sign […]

Exploiting a wireless mesh network for utilities

I think it’s only a matter of time before someone exploits a wireless mesh network that controls and reads home utility meters to get free water and electricity. Until then, there is a problem of range and coverage. Greentech media reports that Trilliant ( a smart meter neighborhood networking startup) has bought SkyPilot for it’s […]

US Military firms recruiting hacker soldiers

It seems that the GFC is creating a movement of migratory hi-tech workers from Silicon Valley to the Beltway. I’m not sure that an unemployed IT security analyst turned hacker is the best choice for a defense contractor – the really good guys and gals are always in demand – and those DC summers are […]