ITsecurity
twitter facebook rss

No Reasonable Expectation of Privacy

Posted by Martin Zinaich on July 1, 2016

Privacy

Is there a reasonable expectation of privacy on the Internet? A senior US district judge recently stated the technically obvious, but it may come as a shock to many. The FBI seized control of Playpen, a dark net website dedicated to child porn distribution (yes disgusting and good for the FBI). In building their case, […]

Delphi Disillusion

Posted by Martin Zinaich on June 19, 2016

What propels a company into higher markets has always been a mystery to me. Often it does not seem to require having the better product. When looking at the origins of some of my favorite companies, they certainly had the better products but failed to capitalize on their strengths. Take Word Perfect versus Word, or […]

Governance the often-missing piece of Information Security

Posted by Martin Zinaich on March 12, 2016

In the report, What does Information Security have in common with Eastern Air Lines Flight 401? – I posit that one byproduct of professionalizing Information Security will be elevating it to the board level where it belongs. I also wrote the following: “…it is no longer adequate that organizations secure only “their” network. Vendors, suppliers, […]

Applesauce, The Apple FBI Backdoor

Posted by Martin Zinaich on February 19, 2016

The Apple FBI Backdoor While the FBI has been after Apple to create a backdoor to iOS, this recent episode stems from the December attacked of Syed Rizwan Farook who killed 14. Farook had expressed support for the Islamic State on a Facebook page and there are still many questions about whom the shooter might […]

CJEU in very dangerous waters

Posted by Martin Zinaich on February 6, 2016

The European Court of Justice (CJEU) is presiding over a case that could effectively destroy the Internet, as we know it. The debate is if a website hyperlinks to content that infringes on copyright laws, does the hyperlink to that freely available media constitute an infringement. The court heard arguments regarding the GS Media case, […]

Win10 Update

Posted by Martin Zinaich on November 15, 2015

Microsoft is releasing a new major update for Windows 10. In the list of updates is one for the enterprise that we reported here on Aug 6th. “For Enterprise customers, there is also the ability to turn off all telemetry information. Microsoft advises against this so it can continue to improve the Windows 10 experience, […]

Big Things & Small Things

Posted by Martin Zinaich on November 14, 2015

Big Things & Small Things

Alvin Toffler, an American writer and futurist known for his works discussing the digital revolution, communication revolution and technological singularity, once said, “You’ve got to think about big things while you’re doing small things, so that all the small things go in the right direction.” He is right, certainly about this digital revolution. Cases in […]

A Funny Thing Happened at the Conference

Posted by Martin Zinaich on October 3, 2015

I recently spoke at the IT Audit and Controls Conference in Florida. I was doing my normal cantankerous venting about how businesses do not get that Information Security is a business problem and not just an IT problem. In fact, one recent study found that 80% of the total value of the Fortune 500 now […]

Music a Bridge Too Far, But Not Your Personal Data

Posted by Martin Zinaich on September 5, 2015

I was a member of MP3.com back in the day and even had a song make it into the top 10 of its genre. Also at that time, Napster was in a huge legal battle and rightfully so because it literally was breaking copyright laws by sharing music that was not properly purchased. MP3.com also […]

Woefully Unprepared, but Full Steam Ahead!

Posted by Martin Zinaich on August 15, 2015

I have called for a professionalizing of the Information Security field. And please know that professionalizing does not equate to governmental control, but possibly oversight. One major reason I believe this is needed is simply that Information Security has failed to become inculcated into the business proper. It is usually a subcomponent of IT and […]