Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: Social Engineering

Are Protected Data Safe?

– What am I missing? Time and time again the fortress approach to information security is trotted out in all its glory … only to be deflated by some easy, cheap way of getting to the crown jewels. So it is in a column by Jennifer Saranow Schultz with the title “Data Is Protected, but Is…

Passwords … Here We Go Again, Again

– In “A Strong Password Isn’t the Strongest Security” (The New York Times, Digital Domain, September 5, 2010), Randall Stross rightly points out the fallacy of “strong” passwords, which are “changed constantly.” Mr. Stross goes on to describe a method developed by Microsoft researchers…

No Tech Hacking

– I recently had the privilege of bring a special contributor, along with a few other brilliant security folks, of Johnny Long’s latest book: No Tech Hacking. All of us in the security profession are familiar with the concepts, and have used them from time to time without realizing it. So what…

Our End Users: The Weakest Link

– Hackers and professional criminals are like most people; they want to accomplish their goal in the easiest way possible. As we have become better at implementing technical controls, such as hardening servers, more aggressive patching, and deployment of a vast array of security devices /…

ID Thieves: Now Getting Married Under Your Name!

– The NY Post reports: Thirty-five couples who were denied marriage licenses in New York City have appealed those denials in the past 10 months on the basis that they were victims of ID theft. The prevailing theory is that thieves used the stolen names to get married for the purposes of green cards…