Why One Hack Is Different From Another For Consumers

I often field questions about what certain news stories mean in general and to the person asking me.  These questions tend to include “what should I do” followed by “is that what you’re doing?”

First – As the About page states, these are my views and not indicative of any employer or any other associate of mine.

Professional Organizations – How to Connect & What They Offer

 

This podcast is for both seasoned information security professionals and those who desiring a career in infosec, risk management or privacy. To that end there are agencies that can be beneficial for those at the beginning of their careers or those who are interested in more peer and community engagement.

Standardize Your Security In An Agile Culture

 

Thoughts on Information Security and Risk Management in an Agile Culture

 

 

Narrated slidedeck from a presentation given at the Chattanooga chapter of ISSA.

In keeping with the Ides of March timing of the presentation, I chose to model my analogy to include references to Julius Caesar and Mark Antony.

Identification Performed by Humans

Identification is a process whereby an identity claim is made and evaluated.

Cyber woman with technolgy eye looking

 

Organic Operations

Humans do this very naturally when we learn one another’s look, voice, walk and other mannerisms.  The more intimately we know someone the more difficult it is to forge or impersonate that identity in our presence.

Disney Identity Starts With 80,000 Customers

fingerprint_scan_600x400

SecureID News reports that Disneys MagicBand IDs are a great success, having been used by some 80,000 attendees in 2014.  The enhancement cost $1 billion and should open new revenue streams or enhance existing ones by EoY, 2014.