The information security community has for a long time been using the medieval strategy of building castles to secure territory; better known as defense in depth. The strategy of defense in depth, while still very effective, does have its weaknesses. …..
Today Computerworld published an article about an office complex that is implanting RFID chips in employees’ hands to facilitate access. While this was done on a voluntary basis, I find the idea troublesome on several levels. The two biggest problems …..
An interesting interview with Howard A. Schmidt, former Cybersecurity Advisor for President Obama, from the CIO Network was just posted by the Wall St. Journal. He discusses the steps an organization should take once they realize they have been breached. …..