Tag Archives: security breaches

It may surprise a few people, but I’m just not worried about my credit card being stolen. In fact, I refuse to worry about it. That may sound like heresy for someone who is supposed to know a little bit … Continue reading

Posted in Botz Blog, Cloud Security, Info Security Mgmt, Information Security, Mobile Security, Security Breach | Tagged , , , , , | Leave a comment

CAUTION: RANT ALERT On Wednesday, November 19, Admiral Michael Walters, the head of the NSA made a very disturbing announcement. He said that China and one or two other countries have the capability to launch a cyber attack that could … Continue reading

Posted in Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , , , | Leave a comment

Utilities tend to harden their hardware and software implementations and stick with them for a very long time — 10 years or more. This article raises concerns about utilities sticking with Windows XP now that Microsoft no longer officially supports … Continue reading

Posted in Info Security Mgmt | Tagged , , | Leave a comment

In the last week or so it has come to light that the way the Target Corporation attackers got into Target’s internal network was by using a vendor’s userID and password. The attackers first compromised the vendor’s corporate network. From … Continue reading

Posted in Biometrics, Botz Blog, Information Security | Tagged , , , , | 3 Comments

Did you ever think that the potential cost of a security breach is overstated by those who want to sell you security software or services? Well, no matter how you add it up,  the potential cost to Target during the … Continue reading

Posted in Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , , , , | 1 Comment

Evernote had its share of stress last week. Proactively resetting 50 million users’ passwords may be the best way to handle a security breach once it happens, but why did it happen at all? Read the backstory here and learn … Continue reading

Posted in Cloud Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , | Leave a comment