What do you think about WikiLeaks?

December 6, 2010

Should Julian Assange go to jail? Is he an international terrorist? I’ve heard so many different opinions on the man and the website who is responsible for the release of so many classified documents and everyone seems to agree that what he did is wrong but what should the punishment be. Maybe you don’t even think he should be punished.

The latest news today was that Assange will be meeting with his attorney and police today to begin to figure out what happened and what if any laws he’s broken. I’d be interested to hear your thoughts on the subject.


China is Back on the Attack

March 8, 2010

Recently NATO and allies have warned people about increased cyber attacks that are targeting important government and intelligence computers. And no surprise, many of these attacks are originating in China. A report released by the FBI last week stated, “a real and expanding threat.” It appears that these attacks are designed to fish for important information or to disrupt important systems. It is believed that approximately 1.6 billion attacks are targeted at our government each month.

To read more, click here.

Addressing ALL of your security exposures

August 7, 2009

Last night I attended a cyber security roundtable hosted at the Intercontinental Hotel in Kansas City. The members of the panel were 2 FBI Special Agents and a national security consultant from the Laconia Group. Among the many topics they discussed was the importance of addressing every potential security exposure you have as a business.

The Fence analogy, which they used to explain the issue, discusses the importance of constructing each plank in the fence as opposed to building half of them 15 feet tall and leaving the other half out. A fence missing planks won’t keep anyone out but a fence with every plank that’s 5 feet tall will keep people out. When talking about security, it’s important to address every issue facing your business and it’s valuable assets. These issues can be insiders, investors, marketing materials, cyber security, or your suppliers. If you have the most sophisticated cyber security system but your vendors release all your information, you’ve done nothing. If you make potential investors sign an NDA but those potential investors take that information and sell it to a competitor, you’ve done nothing. If you’re interested in hearing more about the presentation, feel free to shoot me an e-mail.