Skip to main content

The WiKID Blog

Viewing posts from January, 2009

identity-theft-hits-3-percent-in-2004

Security Focus has the article about the DOJ Survey on the number of US citizens hit by identity theft, but Security Curve puts it in perspective

infoworld-on-how-to-become-a-great-information

Consistency, covering the basics and using metrics Great article for all management, not just information security. When problems crop up in management, it is usually because either we stopped doing some basic thing like cross-department meeting or it could have easily been avoided by implementing some new simple thing.

infosec-economics-article-on-security-pipeline

There's an interesting article on Security Pipeline about the economics of information security. The article discusses why ROI is a poor measure, echoing my first post. But it misses out on a key point: that investing in security reduces your weighted average cost of capital and that you must include the cost of capital in your investment analysis.

interesting-analysis-of-passmarks-technology

Adam has pointed out a friend's new blog who has a set of interesting new blog posts, most about security and some about authentication and one in particular about Passmark's Sitekey - now deployed by Bank of America - and the issues he has with it. They fall into two categories: user interaction predictions and security

is-hipaa-about-to-get-some-teeth

The healthcare world is abuzz with the news that the Department of Health and Human Services is auditing Atlanta's Piedmont Hospital:

Neither Piedmont nor the HHS has confirmed that the audit was launched, and few details about it have been disclosed publicly. But an HHS document obtained by Computerworld shows that Piedmont officials were presented with a list of 42 items that the agency wanted information on.

Among them were the hospital's policies and procedures on 24 security-related issues, including physical and logical access to systems and data, Internet usage, violations of security rules by employees, and logging and recording of system activities. The document also requested items such as IT and data security organizational charts and lists of the hospital's systems, software and employees, including new hires and terminated workers.

Recent Posts

Archive

2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom