Communications Acceptable Use Policies: Some Cybersecurity Considerations
Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications…
The U.S. Government’s Top Priority for 2013; Or, it should be…
An analysis of the Obama Administration draft cybersecurity Executive Order.
Incubator of Catastrophe
The up-tick in cybercrime and the advanced persistent threats that U.S. corporations and citizens are facing minute-by-minute and day-by-day in cyberspace present a great test in a leaderless, G-Zero world.
The Good, Bad & Ugly of Cyber Security
It's clear that it will take a generation (or more!) for this digital industrial revolution to achieve a new stasis (or equilibrium) point, and for human evolution to naturally catch…
Security Standards Council: New QIR Training
Point of Sale (POS) manufacturers, integrators and re-sellers may now take an on-line training program and on-ground test through the Security Standards Council to become certified for installations.
Some Case Law on the Use of Social Media
Case law is emerging on the use of social media in resolving disputes. Here is a summary of some recent cases.
Social Media and Data Integrity
How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.
Is it worth it to do “Social Media”?
Is it worth it for companies to actively engage in social media? The risks must be weighed.
Cybersecurity for Real Estate Agents
Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and…
Tragedy of the Cyberspace Commons
Two sides are battling for your mind and soul on the Internet. Which camp do you fall in?