by Greg Scott | May 13, 2015 | Cybersecurity
I was in a Barnes and Noble bookstore a few days go, pitching my new book, “Bullseye Breach,” to one of the folks working behind the counter. I know all the big decisions are always made at corporate headquarters, but nobody invited me to...
by Greg Scott | Apr 21, 2015 | Cybersecurity
The short answer is, no. The pro argument says law enforcement needs this tool to fight crime and terrorism, and we can build appropriate safeguards into any law to prevent abuse. The con arguments point out the danger in granting more power to the government,...
by Greg Scott | Dec 10, 2014 | Cybersecurity
By now, we’ve all read and digested the news about the December 2013 Target breach. In the largest breach in history at that time and the first of many sensational headlines to come, somebody stole 40 million credit card numbers from Target POS (point of sale)...
by Greg Scott | Mar 26, 2014 | Cybersecurity
Sometimes when high tech meets international politics, reality really is stranger than fiction. First, a few enlightened members of our US Congress accused Chinese telecom equipment giant, Hauwei, of spying for the Chinese government. Here is one of many press...
by Greg Scott | Feb 14, 2014 | Cybersecurity
With all the IT security issues in the news lately, suddenly IT security is everyone’s problem. One natural question behind the headlines is, what is the right way to handle IT security vulnerability disclosures? Here are some thoughts. To keep things simple, let’s...
by Greg Scott | Feb 8, 2014 | Cybersecurity
Given the recent security breaches all over the news, what would a good Main Street business security solution look like and how much would it cost? After all, if organizations such as the NSA and large retailers such as Target can’t keep their secrets safe, what...
Recent Comments