Sister CISA CISSP:

August, 2010

1

August 31, 2010  6:23 PM

From the Council of Gov’t CIOs to the Feds: Address the Risks of Cloud Computing



Posted by: Arian Eigen Heald
cloud computing, Cloud Security, Data Center, information security, Privacy, privacy on the web

Last week the Chief Information Officers Council, a government body established by legislation in 1996, comes a Privacy Recommendations Paper from the Council to all government departments and agencies. So this paper carries a little extra...

August 26, 2010  1:33 AM

Smart Phone Photographs Can Expose Much More than The Picture



Posted by: Arian Eigen Heald
data security, Privacy, privacy on the web

Would you publish a digital photograph from your smart phone on the Internet if it could tell everyone where you lived, or where you were when you took it? Unless GPS capability is specifically turned off (for phones that have it - think iPhone, Palm and Blackberry) photographs that are posted...


August 20, 2010  8:34 PM

Myths About Reputation Risk



Posted by: Arian Eigen Heald
Data Breaches, data security, Privacy

I received some entertaining feedback on my previous blog, so I thought I'd share some of the comments I've heard over the last few years about business reputations: 1. "My data is outsourced (hosted, in the cloud, etc) at a third party company. If they lose my data, or get broken into, it's...


August 17, 2010  7:55 PM

Rethinking Reputation Risk



Posted by: Arian Eigen Heald
Data Breaches, privacy on the web, search engines

In a discussion with a client recently, we were talking about reputation as a "risk" to his business. He didn't seem to think it was a long term issue, because so many other issues capture public consciousness so quickly. This got me thinking about "reputation risk" as a concept. I realized that...


August 3, 2010  4:54 PM

Studying Google and Twitter for Malware



Posted by: Arian Eigen Heald
information security, IT Security, malware management, social networking, Web Security

The folks from Barracuda Labs have issued a midyear report with some riveting data about the connection between Twitter and Google as venues for malware. You can see the summary and download the report


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: