• Aug 08
    2017
    In 1991, at the Computer Laboratory of the University of Cambridge, England, the coffee machine was located next to the Trojan Room. In order to save people the disappointment of making a trek to the coffee machine and finding it empty, a couple of the researchers set up a 28 x 28 px greyscale camera pointed at the coffee machine and connected the camera to the Laboratory’s network, so that ...
  • Aug 03
    2017
    At the IT Certification Council, we believe in professional certifications, and we’re glad to have the chance to work with industry leaders on the issue. We think the value of certification to an IT professional is obvious. There is no better way to advertise your skills than to get them certified. Certification benefits employers, too. Obviously, certifications help in the hiring process, but we wanted to mention four benefits that ...
  • Aug 01
    2017
    Nearly a year ago, I wrote a blog post about how criminals are changing their approach to cybercrime. They are increasingly well capitalized, and they are investing resources in research and development, both in the areas of social engineering and the technical investigations of system vulnerabilities. Since I wrote that blog post, the criminals have continued to change. Cybercrime looks different today than it did a year ago. It will ...
  • Jul 25
    2017
    According to TechNewsWorld, UpGuard, a company that makes a business of assessing risk for its clients, last month discovered millions of unsecured Verizon customer records on an Amazon server. UpGuard said there were 14 million records, but Verizon later insisted there were only six million. There’s no evidence that anyone besides UpGuard researchers (who found the records in their unsecured state) even saw any of the data, much less stole ...
  • Jul 18
    2017
    What affects the cost of a data breach? As I noted in this blog post a couple weeks ago, the 2017 Cost of Data Breach Study: Global Analysis identified half a dozen contributors: unexpected and unplanned loss of customers (churn rate) number of records lost (the more records lost, the higher the cost) post-breach costs, including the costs of victim notification whether the incident results from an attack or negligence ...
  • Jul 11
    2017
    If your experience is anything like mine, you don’t have much respect for the average spammer. The messages are so crude and so easy to see through that it’s a wonder any of them ever succeeds. Do they really think I might believe a message with the subject line “No Diet Or Exercise, AND Still Lose Weight” or “#1 Weird Trick To Pay $7 Month On Electricity”? I saw some ...
  • Jul 05
    2017
    The 2017 Cost of Data Breach Study: Global Analysis has been released, and you can download it here (registration required). Sponsored by IBM and performed by the Ponemon Institute, this year’s study suggests that cybersecurity may be improving: The average cost of data breach decreased 10 percent and the per capita cost decreased 2.9 percent. However, the average size of a data breach (number of records lost or stolen) increased ...
  • Jun 27
    2017
    Last November, TEKsystems, an IT staffing firm, released the results of a survey of IT leaders in which more than half (53%) of the respondents said their organizations had no formal strategic workforce planning strategy. Nearly three-quarters (73%) don’t begin workforce planning for an IT project longer than three months before the project kicks off. It is probably no coincidence that the survey also found more than two-thirds of respondents ...