Tag Archives: compliance

Impacted Molars II

OcclusalPanopticonistas Cyveillance say ID theft is so bad, we are all going to die. Seems like shutting down copyright scofflaws got a little too Web 1.0 for them, so they’ve unleashed their vicious crawling spiders on a search for contraband … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Auditing Privacy Part 1 – Ethics and the Canon

It would comfort many compliance auditors to discover the ultimate checklist and tear after their organization’s privacy program, collecting tick marks and developing the dreaded deficiency finding. I say to them, “Google is your friend.” For the more enlightened internal … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

SSN Panic, Texas Style

Here’s the Computerworld run-down. And here’s the Attorney General’s letter (worth reading) and the proposed bill to change the law Texas HB 2061 so as all the county clerks don’t get thrown in jail. The AG letter says it in … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Privacy and Security Lessons from Criminal Enterprises: The Corner & PCI

Either you have heard the stories, or encountered first hand the difficulty in convincing an organization’s leaders to take adequate precautions to insure the privacy of identity related data, and maintain the integrity, confidentiality and availability of their information assets. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Impacted Molars: Misguided Ninja Dudes and PCI Awareness

MESIALDark Reading continues its obsession with physical security:Network dude rassels potential bad guy, followed by a stern warning on what a scary world it is out there, cause physical attacks hurt.Forgive me if I’m out of line, but why would … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Everyday Privacy and Security: The Drug Store

After a conversation with a friend, I thought I’d cite some examples of how privacy and security impact day-to-day life. Here’s the first in the series; though I admit, dissecting the CMEA would take more effort than I have time … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Infosecalypse Now

A number of links in the chain:Mr. Walsh asks Why We Fight?Which spurs Mr. Hoffman’s Nam flashback.Bloginfosec says it’s safe to surf this beach, so its safe to surf this beach. Meanwhile, Charlie squats in the bush, everyday getting stronger, … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Buzzword Compliance or Compensating Controls

The most recent SANS e-mail letter, this article from Computerworld on pretty minor (all things considered) security incident at federal retirement fund agency.The voice of SANS (Pescatore in this case) remarked thusly: This and the Nordea incident, as well as … Continue reading

Posted in Uncategorized | Tagged , , , | 2 Comments

Corporate Information as Reverse Spam

From the NYT – Firms Fret as Office E-Mail Jumps Security Walls. A growing number of Internet-literate workers are forwarding their office e-mail to free Web-accessible personal accounts offered by Google, Yahoo and other companies. Their employers, who envision corporate … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Provably Private?

From the Guardian, I read this curious article on privacy and contextualintegrity. “Linear temporal logic,” eh? I wish I could groove to what that means. So I read Wikipedia, then I started researching the folks mentioned in the article, finding … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment