NuSecure Insights

Privacy on the Web (Part 1)

As a security professional, I have monitored privacy laws for the past decade or so. My interest in these laws started long before that when a friend gave me a... Read more about 'Privacy on the Web (Part 1)'...

Moore's Law

Many of us have heard of Moore's law or have used the term when discussing the increases in computing power over the last couple of decades. Read more about 'Moore's Law'...

Data Explosion

Many years ago, MANY years ago, I bought a PC with a 10 Megabyte hard drive.  All my friends were envious of me having that tremendous amount of storage. Read more about 'Data Explosion'...

Social networking within a company (Part 2)

The issues around social networking are basically the same as in the past.  The general user population wants, even demands that social networking be allowed within and from outside the corporate... Read more about 'Social networking within a company (Part 2)'...

Social networking within a company (Part 1)

I attended a security conference a short time back (http://nuspire.com/CAMPIT.aspx).  There were two panel discussions that involved the securing of network data sources while allowing social networking by employees. Read more about 'Social networking within a company (Part 1)'...

What effect have the Regulations or Business Requirements had on Information Security? (Part 2)

The Secret Service report states that exploitation of vulnerabilities has dropped significantly in the last couple of years.  The reasoning is, many of these exploits can be stopped with a comprehensive vulnerability... Read more about 'What effect have the Regulations or Business Requirements had on Information Security? (Part 2)'...

What effect have the Regulations or Industry Standards had on Information Security? (Part 1)

All of us in the Information Security field have watched different security regulations become law and we have debated what effect they would have on our industry.  Some of us even... Read more about 'What effect have the Regulations or Industry Standards had on Information Security? (Part 1)'...

Massachusetts New Privacy Law (201 CMR 17.00): Are You Ready?

March 1, 2010 has come and gone. If you are a person who owns or licenses personal information about a resident of the Commonwealth of Massachusetts, the law has changed... Read more about 'Massachusetts New Privacy Law (201 CMR 17.00): Are You Ready?'...

3rd Party Applications Open Holes Too!

For years, we’ve heard the ire of security professionals worldwide over the vulnerabilities of the Microsoft Operating Systems.  Many touted Linux or even Macintosh as the answer.  Unfortunately, there is... Read more about '3rd Party Applications Open Holes Too!'...

Spend an Hour Now…Earn Double That Later!

As I’ve been traveling the country lately, I’ve been learning more and more about how the PCI-DSS requirements are affecting businesses.  There does still seem to be quite a bit... Read more about 'Spend an Hour Now…Earn Double That Later!'...

Clarifications on WPA/TKIP Vulnerabilities

Recently, a research paper published from Japanese academics demonstrated a newer, faster, and more reliable way to crack wireless networks that use WPA/TKIP protocols.  In the best case, such a... Read more about 'Clarifications on WPA/TKIP Vulnerabilities'...

Security Steps for Compliance Purposes? Why Not Just for the Sake of Security?

All too often I hear businesses ask the question, “What do I need to do to be compliant with XYZ regulation?”. Read more about 'Security Steps for Compliance Purposes? Why Not Just for the Sake of Security?'...

Small Merchants and PCI Compliance

Are you ready? As you may or may not be aware, starting next summer ALL merchants including the smallest will be required to become PCI compliant. Read more about 'Small Merchants and PCI Compliance'...

Cyber Security Act 2009 (Part 1)… Huh?

Last weekend I was reading about a bill introduced April 1st in the US Senate co-sponsored by Sen. Jay Rockefeller (D-W.Va.) and Sen. Read more about 'Cyber Security Act 2009 (Part 1)… Huh?'...

What is the Value of the Cybercrime Industry?

I was reading Richard Stiennon’s blog the other day titled “Stay calm people. Cyber crime does not reap $1 Trillion in profits“.  In that article, Richard Stiennon stated he would... Read more about 'What is the Value of the Cybercrime Industry?'...

Doing the “Impossible”

We’ve all heard lines like these before:  “That can’t be done”; “There’s no way to make that work like that”; “It just won’t work”; and/or “It’s impossible!”  Maybe with all... Read more about 'Doing the “Impossible”'...

They Recommended What?!

I dare say that anyone who has ever held any kind of professional job can attest to the fact that there are varying degrees of skill sets. Read more about 'They Recommended What?!'...

PCI - The More I Learn, The More I Realize What I Don’t Know…

I recently completed the training class to become a PCI-SSC QSA, or a Payment Card Industry Security Standards Council Qualified Security Assessor (whew what a mouthful).  Basically, a PCI-SSC QSA... Read more about 'PCI - The More I Learn, The More I Realize What I Don’t Know…'...

1 2 3 4 5 6 7 8 9 10


Nuspire Insights






Nuspire Infographic


Contact Us

Leave this empty: