Archives: September, 2017

Doug Bedell — September 29, 2017, 3:38 pm

12th Homeland Security Week Conference Coming Up

The 12th annual Homeland Security Week conference will be held Oct. 24-27 in Washington, the Homeland Security blog advises. “The conference brings together some of the country’s top subject matter experts in fields related to national security, intelligence, counterterrorism, border security, biometrics, cybersecurity and many more industries.” Here’s more about the conference, which was begun […]

Doug Bedell — September 27, 2017, 10:32 am

Police Using Garbage Trucks Against Vehicle Terror Attacks

Police have been getting creative in protecting against vehicle terror attacks – even to using garbage trucks as security barriers. That was the thrust this month in a National Public Radio report explaining “why the garbage truck is on the cutting edge of law enforcement.” “Even the Trump tower in Manhattan has been encircled by […]

Doug Bedell — September 25, 2017, 11:07 am

Drone Collides With Army Helicopter over New York City

Drones, it seems, are getting reckless. At least one did, anyway, over New York City. An Army helicopter collided with a drone while the helicopter was patrolling over New York. The helicopter, explains the DefenseTech blog, was part of the security detail for the U.N. General Assembly meeting that started this month. “The collision damaged […]

Doug Bedell — September 22, 2017, 12:10 pm

Computer Hacking: A Top-Ranking Security Concern

Evidence that the security of using the Internet is a growing concern comes in a Dark Reading post headed “Americans Rank Criminal Hacking as Their Number One Threat”. Criminal hacking scored above air pollution and disposal of hazardous waste in landfills as concerns of the 740 respondents in an online survey. “It’s pure speculation on […]

Doug Bedell — September 20, 2017, 6:34 pm

Lurking In Security Readiness: The Human Factor

People want to be helpful but that, Taylor Armerding on the Naked Security blog notes, can make the human factor a big part of security challenges. Some pertinent factors cited by Armerding: “• Attackers take advantage of the general tendency of people to want to be helpful. “• People are trained to be compliant with […]

Doug Bedell — September 18, 2017, 11:01 pm

Security Lesson: Pay Heed to the Equifax Data Breach

Equifax, a consumer credit reporting agency in Atlanta, GA, is just about the worst sort of enterprise to be hacked, from the public’s point of view. But it was. “The more than 143 million consumer credit records hacked from Atlanta-based Equifax during May, June and July,” Security InfoWatch reports, “saw all sorts of personal data […]

Doug Bedell — September 15, 2017, 11:53 am

Vigilance Matters Greatly In Heading Off Security Breaches

So there is Equifax, with a security breach in which, notes the Security magazine blog, “thieves made off with highly sensitive personal information including the Social Security and credit card numbers of at least 143 million people.” “The most troubling aspect of this data breach,” Security tellingly adds, “is that it was likely to have […]

Doug Bedell — September 13, 2017, 11:18 am

Digital Identities a Security Challenge of Our Times

For real digital security, the world needs a mass digital identity system, says John E. Dunn on the Naked Security blog, but, unfortunately, that “remains stuck somewhere between non-existent and a total mess.” “Ask someone to prove their identity today, he writes, “and almost without exception they will fall back on a paper passport, driving […]

Doug Bedell — September 11, 2017, 8:49 am

A Book on Sorting Through Internet Security

We’re not usually into security book reviews, but here’s a reference to one on Government Security News that might be worth this exception. It’s a discussion of Borderless Behavior Analytics – Who’s Inside? What’re They Doing? by a number of contributors, led by overall author Ankur Chadda. One sentence that’s caught our attention is “One […]

Doug Bedell — September 8, 2017, 10:20 am

Taking Cyber Security Seriously With an SOC of Your OWN

We’ve been talking about organizations taking digital security seriously at a time of rising cyber threats. So, just came upon a post on the Security blog about installing a Security Operations Center (SOC) in your organization. They can be from rudimentary to sweeping in size and complexity – but at any level, an SOC is […]