There is no universal standard of what the acceptable boundaries of privacy are. The European Union tends to have a more stringent view of what constitutes personal privacy, while the United States seems to favor corporations vs people when it comes to...
Over the past few days, I have seen at least two posts or articles on a subject I’ve been meaning to write about for quite some time, now. The first one I saw was by Rob Howard, and although it deals mostly with software development, it struck a chord with me. ...
It is very easy to become complacent with Information Security on a home computer or network, even for those who would otherwise preach IT Security in a corporate setting. There are several reasons why this attitude can develop, even in people whose line of work...
Five years ago, I wrote an article on the challenges of implementing Information Security in an enterprise. Sad to say, even in the post-911 era, not a whole lot has changed there. Sometime in the next couple weeks, I’ll write an updated...
There’s a very interesting article up on SANS Internet Storm Center concerning the security implications of the proposed Net Neutrality legislation that is being discussed ardently in some circles… Briefly, network neutrality is designed to prevent ISPs...