Archives: May, 2014

Doug Bedell — May 30, 2014, 2:22 pm

IT Security People In Strong Demand

The rush is on – has been for some time – for IT security staffers. In a “flash poll” taken by Information Week, “roughly eight out of 10 respondents say their companies are struggling with personnel issues related to the skills of in-house staff, finding qualified candidates for new positions, and having a sufficient budget […]

Doug Bedell — May 27, 2014, 11:25 am

Choosing One’s Words at the FBI

Oh dear, the problem of being the FBI director and human, too. James Comey, the said director, is explaining that he was trying to be “funny and human, too” when he remarked, notes NakedSecurity that “a lot of hackers who could potentially work for the FBI are pot smoking kids who ‘want to smoke weed […]

Doug Bedell — May 19, 2014, 9:50 am

Risks in Buying Used Tech Equipment

Meet Steve Hunt, publisher of the SecurityDreamer blog. He writes about security, technology, society and quality improvement, and he’s got a great post on “spring cleaning” in the office – how “it may create new information risks.” One of the risks he’s mindful of arises in buying used office equipment, something that may be attractive […]

Doug Bedell — May 16, 2014, 12:36 pm

Down the Road, GPS Could Give Way to a ‘Quantum Compass’

The Global Positioning System (GPS), dating from the 1970’s, is facing replacement by a “quantum compass” system, In Homeland Security (IHS) reports. It will be 3-5 years before the new system is ready for mass production, but scientists in the UK, at least, believe it’s definitely in the cards, says IHS writer William Tucker. A […]

Doug Bedell — May 14, 2014, 11:58 am

‘Antivirus’ Alone Not Enough Any Longer, Krebs Says

It used to be that reputable antivirus software alone would protect computers from hackers, but not anymore, says Brian Krebs in his Krebs on Security blog. The post provides a review of Internet security trends over the past, say, 15 years. Antivirus software remains useful, “if somewhat antiquated and ineffective,” Krebs says. “Security is all […]

Doug Bedell — May 12, 2014, 12:29 pm

3D Printers Can Create An ‘Arsenal’

Oh dear, what the new 3D printers can do. A Danger Room post talks about how they can print out pistols – and there’s even a demonstration of the accuracy of a 3D-printed shotgun shell. The printers are fairly expensive and the process takes a while – but 3D printing works, all too well, some […]

Doug Bedell — May 9, 2014, 11:06 am

Cyber Security a Booming Market

The cyber security market – protecting against electronic intrusion, tampering and theft – is hot and growing rapidly. in a post on Information Week’s Dark Reading blog, Rick Gordon explains why. Cybercrime, Gordon notes, is a growing threat; a vast array of Internet-connected devices has emerged; people are increasingly mindful of cyber risks, and “the […]

Doug Bedell — May 7, 2014, 11:13 am

Dispose of Cyber Materials Securely, Too

Got all your old cyber materials securely deposited in the landfill’s trash? Don’t bet on it. Dr. Guy Bunker writes on the Clearswift cyber protection blog about an ET game for Atari (remember back then?) being found in a New Mexico landfill. And then there’s the story of artwork that Andy Warhol made on floppy […]

Doug Bedell — May 5, 2014, 10:21 am

TSA Caught Fidgeting Again

Security organizations need continually to evaluate how well their equipment is performing and be alert to opportunities to enhance it. That no-nonsense observation apparently hasn’t applied to the Transportation Security Administration (TSA), however. Quoting the Government Accountability Office (GAO), Government Security News reports, among other apparent lapses, that “At approximately half of the airports utilizing […]

Doug Bedell — May 2, 2014, 11:43 am

Cyber Security Risks Rising

Here’s unsettling news, indeed. A majority of security professionals don’t think “they cab truly protect their organizations from cyberattacks.” That’s the word from Information Week’s Dark Reading blog in a post by Kelly Jackson Higgins. She’s noting a report by the Ponemon Institute in Traverse City, MI, that “Some 57 percent of security pros say […]