Archives: February, 2014

Doug Bedell — February 26, 2014, 4:20 pm

How Neiman Marcus Was Hacked

Neiman Marcus has acknowledged that computer hackers in the retailer’s computer network “were able to move around unhindered for more than three months,” not because the chain was careless, but because the hackers were pretty smart. Their actions “constantly tripped hundreds of alarms that were not detected by the Dallas-based retailer,” Blumberg Businessweek and NakedSecurity […]

Doug Bedell — February 25, 2014, 1:01 pm

Where Credit Cards Come From

Ever wonder where credit cards come from, that is, how they’re produced and provided? The question arises in the wake of the recent Target stores security breach, and is answered in a Krebs on Security blog post today, Feb. 25, 2014. The post provides guidance on credit cards in the wake of the Target breach […]

Doug Bedell — February 18, 2014, 4:04 pm

Security Systems for ‘Scrap Yards’ a Growing Need

What are the connections between security, protecting the environment and recycling? Strong, because humans, notes the Advanced Perimeter Systems Blog, are using up natural resources at an annual rate half again as fast as what the earth naturally provides. Thus scrap materials of all kinds, their value increasing, are subject to theft if “junk yard” […]

Doug Bedell — February 14, 2014, 12:57 pm

DHS Serious About Coordinating for Cybersecurity

There’s a lot to wrap your head around here, but the Federal Government is making an apparently earnest effort to coordinate and connect cybersecurity resources with the aim of protecting the nation’s critical energy and communication structures. The Department of Homeland Security calls it the Cyber Community C³ Voluntary Program. You can check DHS’ thinking […]

Doug Bedell — February 12, 2014, 11:55 am

Secretary Johnson’s First Major DHS Address

Meet Jeh Johnson, the new secretary of the Department of Homeland Security. After seven weeks on the job, Secretary Johnson delivered his first major address at the Woodrow Wilson International Center in Washington, D.C. You can view it here. He had an overflow audience.

Doug Bedell — February 10, 2014, 1:34 pm

Setting Security Standards for Electrical Fences

It’s always advisable to have agreed-upon standards for aspects of security systems, so we take note of this post on setting standards, via the American Society for Testing and Materials (ASTM), for the use of electric security fences by detention and correctional facilities. It’s possible, notes the writer, that an electric fence standard for correctional […]

Doug Bedell — February 7, 2014, 6:46 pm

A Sense of What Hackers Do

Reports of computer hacking and malware intrusions seem to be arising more frequently, as with the recent situation at Target. With IT being as much a part of security these days as perimeter controls, you might be interested in some insight into how hackers proceed. So here’s a post from the Sucuri blog on that […]

Doug Bedell — February 5, 2014, 2:59 pm

‘Crowdsourcing’ Information Security

The broader definition of site security that’s coming into increasing use – perimeter and information security – is being addressed in a collaborative project on the Securosis website. Securosis seems actually to be “crowdsourcing” the production of an ambitious white paper on “the future of information security.” The outline is available at the above link […]

Doug Bedell — February 3, 2014, 11:44 am

Electronic Eyes on Everything In the Night

The other week, we had a post about license plate readers at entrypoints. Now here’s one on “existence” readers as virtually an electronic security do-it-all. On the Defense Tech blog is this account of Knightscope’s K5 Star Wars-like robotic security station. The K5 can automatically scan an area in 270-degree sweeps and photographically map it. […]