Advances in Technology and Protection of the Rights of the Accused
When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the…
Tools for Analyzing Threats to a WordPress Website
This essay provides links to some tools that analysts can use to visually display patterns of attack against a WordPress…
Eternal Life of Malware
Security specialty firm Alien Vault develops excellent infographs that summarize in visual form some key points about cyber security. Here…
A Preemptive Executive Order: Cybersecurity
Here is a link to the final Cybersecurity Executive Order signed by President Obama on February 12, 2013 with a…
Communications Acceptable Use Policies: Some Cybersecurity Considerations
Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged…
The U.S. Government’s Top Priority for 2013; Or, it should be…
An analysis of the Obama Administration draft cybersecurity Executive Order.
Incubator of Catastrophe
The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in…
The Good, Bad & Ugly of Cyber Security
It's clear that it will take a generation (or more!) for this digital industrial revolution to achieve a new stasis…
Security Standards Council: New QIR Training
Point of Sale (POS) manufacturers, integrators and re-sellers may now take an on-line training program and on-ground test through the…
Some Case Law on the Use of Social Media
Case law is emerging on the use of social media in resolving disputes. Here is a summary of some recent…