Archives: March, 2016

Doug Bedell — March 30, 2016, 12:29 pm

Security Isn’t for ‘Cleaning’ But for Protection

Ray Bernard on Security InfoWatch is a stickler for using terms correctly, as one should be. The security industry, Bernard notes, “is composed of manufacturers and service providers whose purpose is to provide products and services that help an organization’s security stakeholders accomplish the job of protecting the assets in their charge.” “The security profession” […]

Doug Bedell — March 28, 2016, 4:55 pm

‘Breaking Down Walls’ Between Physical and It Security

A conference next week at Las Vegas will highlight how “the lines between the physical security and IT security worlds have begun to blur.” That’s the word from SecurityInfoWatch as it promotes the inaugural Connected Security Expo “that will bring together both physical and cyber security professionals to discuss the threats facing the industry… “With […]

Doug Bedell — March 25, 2016, 9:39 am

If Approached, Some Employees Might Sell Their Passwords

The perils of computer passwords are multiplied by research, noted by Security magazine, showing that “one in five employees would be willing to sell their work passwords to another organization, up from one in seven last year.” They wouldn’t necessarily expect a great payout for doing so, the research indicates, and “more than two in […]

Doug Bedell — March 23, 2016, 9:11 am

Explosions Hit Brussels, Capital of European Unity

The Brussels terrorist attacks were at the capital of European unity. “Authorities captured a suspect linked to the Brussels bloodshed Wednesday,” reports In Homeland Security, “following a massive manhunt, as details emerged of the suicide attackers: two brothers who brought chaos and bloodshed to the city at the heart of European unity, according to two […]

Doug Bedell — March 21, 2016, 6:44 pm

Workplace Security Getting Added Interest

Workplace security is getting heightened interest, as described in this post by Security Magazine, as sponsored by G4S, a security firm. Incidents of workplace violence are among the concerns that arise in business and industry.

Doug Bedell — March 18, 2016, 12:00 pm

‘Real Time’ Response to Cyber Threats Now Possible at DHS

The U.S. Department of Homeland Security (DHS) is extending its “See Something, Say Something” security alert program to computers in virtually instant response time. Participants in its new Automated Indicator Sharing (AIS) system will be able to alert DHS to cyber threat indicators “at machine speed,” or virtually real-time. AIS was mandated in the Cybersecurity […]

Doug Bedell — March 16, 2016, 10:40 am

Traveling Bloggers: Beware of Wi-Fi Hacking

Traveling bloggers beware! Here from the Safe & Savvy blog is a discussion of how easy it might be for hackers to access your cell phone or laptop and gain your banking and other credentials, especially through public Wi-Fi systems. “Anyone who gets online – especially through public Wi-Fi –” the warning goes, “has to […]

Doug Bedell — March 14, 2016, 2:53 pm

Healthcare Organizations, Too, Need To Be Vigilant

Spare us. Even healthcare organizations – hospitals, medical centers, doctors offices – are concerned about cyber attacks and the need to protect themselves with cyber security. That’s the word from Ryan Witt on the Fortinet blog. “‘Houston, we have a problem.’” Witt writes, “This is not news to healthcare organizations, whether they are in Houston, […]

Doug Bedell — March 11, 2016, 7:36 am

IS ‘Security Stick’ Reportedly Stolen By a Defector

The Naked Security blog has a hot piece of news: A defector from Islamic State has brought with him “a stolen USB drive containing a wealth of intelligence about the group’s members.” Supposedly, the information on the drive contains “the identities of 22,000 IS recruits” and personal information about them. The “memory stick” allegedly was […]

Doug Bedell — March 7, 2016, 1:36 pm

Advice for Security Execs: An ‘All-Hazards’ Approach

“The challenge for today’s CSO,” advises Joel Griffin on Security InfoWatch, “is in trying to mitigate the myriad risks presented by an ever-evolving threat landscape while at the same time meeting the goals and expectations of management. Griffin continues: “Although high-profile incidents, such as data breaches, terror attacks and the like have demonstrated the importance […]