The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
It was always a contention of some in public and private sectors. But now, leaked reports to news services contend that the North Korean government was the source of
In a sad and ironic turn, it turns out that the Congressional Record, since 1971, has been posting military officer Social Security numbers. Wacky but true, Stars & Stripes,
The topic was cryptography with Nathan Cummings, director of integration/application for HID Connect, talking this past Tuesday on the impact of new cryptography requirements on next generation physical access
Brand protection and corporate reputations as well as increased regulations are pressuring organizations, especially banks, educational institutions and healthcare firms, to get tougher on securing databases. Often it takes
President Barak Obama, just days ago, announced $3.4 billion in grants to update the nation’s electrical grid aimed at creating a more efficient and reliable electric system in the
Department of Homeland Security (DHS) Secretary Janet Napolitano announced yesterday (Oct. 29) the transfer of the Federal Protective Service (FPS) from U.S. Immigration and Customs Enforcement (ICE) to the
Some say it was an ominous sign when some Bobbies’ helmetcams literally caught fire. The darling of proponents of security on city streets, Great Britain’s police agencies, borough councils
As government and enterprise security work together or apart to prioritize the protection of critical infrastructure, there’s the chance on not spending as much time and resources on soft
Secure communications expert Simon Ford, director of NCP engineering, points out that “most corporations realize the vulnerability of PCs and laptops and have implemented various security protocols to prevent
Security Magazine’s January 2010 has two major features that would gain from your Blogged input. Securing the Global Enterprise -- There are common and unique needs for chief security