What is more important – patient safety or hospital IT?
What is more important – patient safety or the health of the enterprise hospital Windows network? What is more important – writing secure code or installing an anti-virus? A threat analysis was performed on a medical device used in intensive care units. The threat analysis used the PTA (Practical threat analysis) methodology. Our analysis considered […]
Russian cybercrime – pride or prejudice?
Mark Galeotti has a piece on the online Moscow News today entitled Why are Russians excellent cybercriminals? Mr Galeotti seems to have most of his facts right as he wonders: “Why does every hacking and cyberscam story – real or fictional – seem to have a Russia connection?In part, it is prejudice and laziness. The stereotype of the […]
Why Microsoft shops have to worry about security
I am putting together a semester-long, hands-on security training course for a local college. The college asking me for the program showed me a proposal they got from a professional IT training company for a 120 hour information security course. They are trying to figure how to decide, so they send me the competing […]
Charged for stealing 130 million credit card numbers
A Miami man has been charged with the largest data theft ever. Less than 5 years ago, the main modus operandi for stealing identity information was dumpster diving. If you shredded your statements, you were safe. However – today, it’s much more effective to steal the data directly from large retailer databases. Once you’re in […]
What do hackers want?
What do hackers really want? No question is more important for mounting effective security countermeasures. The management, IT and security practitioners cannot expect to mitigate risk effectively without knowing the objectives and cost of potential attacks on their organization. We all depend on transaction processing to run our business and make decisions, no matter how […]