How Rootkits Are Threatening Smartphone Security

Think your cell phone conversations are secure?  Think again….computer scientists at Rutgers University have shown how a familiar type of personal computer security threat can now attack new generations of smart mobile phones,  Read More →

Cyber Security Is First The Lawyer’s Responsibility To Corporate Clients

At first blush this proposition seems counterintuitive.  Isn’t cyber security the domain of the corporation’s CIO?  Let’s not be mistaken the CIO or CISO play major roles but the answer still is No. Three critical reasons why include: (1) the CIO can neither create nor maintain the attorney client privilege without general counsel’s direction of the corporation’s cybersecurity efforts; (2) for the same reasons, general... [Read More...]

Obama Appoints Cyber Security Czar – Howard A Schmidt

Seven months into his term, President Obama has appointed Howard A. Schmidt to the role of cyber security chief.  He will report to the National Security Council and will have regular access to the President. Mr. Schmidt is an industry veteran who previously served the Bush White House.  He was formerly the chief information security officer at Ebay, the chief information officer at Microsoft and worked in computer security for the Air Force, the... [Read More...]

Information & Cyber Security Threat Assessment & Risk Mitigation – New York, New Jersey, Connecticut & Pennsylvania

Information Defense has been conducting a variety of online, data and secure information breach incident response and cyber forensic investigations for New York NY and surrounding states based organizations. (New Jersey NJ, Connecticut CT and Pennsylvania PA in particular.) We are seeing increased losses from having insufficient detective resources and data loss prevention strategies in place to stop such action. Often evidence is either wiped (cleaned)... [Read More...]

What Your Employees Know About Your Business

What your employees know about your business might keep you up at night if you really thought about it.  In some cases the employee may have greater targeted knowledge or access to data than the owners, principals, executive team, or directors. What your employees know about your business may be of strategic value and provide that competitive edge.  It may be the special sauce that took the company years to develop and it may walk out the door prior... [Read More...]

There Is No Perimeter

Last week I mentioned the myth of the “network perimeter” and alluded to the futility of trying to secure it, and I wanted to expand on that theme a little more.  I frequently find myself working with IT staff that have a mentality of “us vs. them” or “inside the perimeter vs. outside the perimeter” concept of security.  I strongly believe that there needs to be a paradigm shift in thinking from the perimeter based view to one of embedding... [Read More...]

Your Network Is Less Secure Than the Internet!

I frequently have conversations with clients who struggle to understand the need for security controls on internal infrastructure, or why the mandates of certain regulations are important.  I get blank looks often phrases like “but it’s behind our firewall” or “that’s not reachable from the Internet”. There is a pervasive, and fallacious, belief that the Internet is some sort of wild middle-ages like kingdom full of marauding Huns and... [Read More...]

Cyber Warfare: Attacks Linked to North Korea

North Korea is suspected of being behind cyber attacks on U.S. and South Korean web sites, says a spy agency from South Korea. Video courtesy of Reuters.  Read More →