Regulatory Reality:

vulnerability

1

October 22, 2010  3:20 AM

After a data security breach, who’s to blame?



Posted by: David Schneier
anti-malware, anti-virus, assessment, Audit, hack, HIPAA, regulations, regulatory, Regulatory Compliance, scanning, vulnerability

I read a blog post last week from my friend Ed Moyle in which he discussed a story about how a professor at the University of North Carolina-Chapel Hill was demoted because a server used in her research project was hacked.  A committee had concluded that it was the professor's fault that the...

June 17, 2010  3:36 PM

Should it be this easy to bypass network security?



Posted by: David Schneier
cyber security, firewall, information security, network, penetration test, penetration testing, Regulatory Compliance, vulnerability

A few weeks back, I went online to pay my cable bill.  There's a long story behind the struggles I've had in doing so since becoming a customer, but I'll save that for another time.   Part of the longer story, though, involves my bookmarking the sign-on page where I can access my account and make...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: