Category Archives: cybersecurity

Don’t Underestimate the Technology

Over at Vice.com, Patrick McGuire has a good article analyzing a new combination of hardware and app called “Tile” that bills itself as “the worlds largest lost and found.” Tiles are little 1″x1″ wifi-enabled tags that you can stick to … Continue reading

Posted in cybersecurity, mobile apps, privacy, social media | Tagged , , , | Leave a comment

Monitoring via Mobile Devices’ Unconnected WiFi

I’ve written a lot about the amount of data we willingly disclose, and how to try to minimize it. A couple of recent articles caught my eye about the degree to which we shed information, even when we don’t mean … Continue reading

Posted in cybersecurity, mobile apps, privacy | Tagged , , , , , , , | Leave a comment

Avoiding the All-Seeing Eye

Not too long ago I posted Privacy and Data Security for the Normal Person and provided general steps the average computer user can take to protect privacy and security online. In the wake of the disclosures about NSA monitoring, many … Continue reading

Posted in cloud, cybersecurity, privacy | Leave a comment

The Hazards of Self-Service IT

Until the advent of peer-to-peer and cloud-based services, corporate systems were developed/acquired, deployed and managed by IT managers and sysadmins. Access to server-level resources (including large storage volumes) was tightly controlled, laptops and desktops were locked down, and even in … Continue reading

Posted in cloud, cybersecurity, privacy | Tagged , , , | Leave a comment

Accounting for Cyber-Security – SEC Cybersecurity Guidance

On October 13, 2011, the Securities and Exchange Commission (SEC) Division of Corporation Finance released CF Disclosure Guidance: Topic No. 2 – Cybersecurity (the “Guidance”), which is intended to provide guidance to companies on whether and how to disclose the … Continue reading

Posted in cloud, contracting, cybersecurity, outsourcing | Tagged , , | Leave a comment

IT Security – Who Watches the Watchmen?

Originally posted April 19, 2011 When clients raise the question of the security of an outsourced service, it’s frequently a proxy for the feeling that they can trust/have control over their own people, but don’t really trust the service provider’s … Continue reading

Posted in contracting, cybersecurity, outsourcing | Tagged , , | Leave a comment

Putting Your Eggs in One Basket – Security and Cloud Services …

Originally posted April 2, 2011 Two recent events serve to highlight the importance of proper due diligence and appropriate contractual protections … Available at http://www.sourcingspeak.com/2011/04/putting-your-eggs-in-one-basket—security-and-cloud-services.html

Posted in cloud, cybersecurity | Leave a comment