Is Cloud Computing Really Risk Transference?

The current buzz in the technology industry is all about this idea of Cloud Computing. It goes by many many names but we’ll just stick with this one to eliminate confusion. Sure, it’s a great idea and vendors are talking about “moving your data to the cloud” where someone else can manage your data, provide…


ALERT: $250,000 Reward

REDMOND, Wash. — Feb. 12, 2009 — Today, Microsoft Corp. announced a partnership with technology industry leaders and academia to implement a coordinated, global response to the Conficker (aka Downadup) worm. Together with security researchers, Internet Corporation for Assigned Names and Numbers (ICANN) and operators within the Domain Name System, Microsoft coordinated a response designed…


Big Bang Machine Hacked!

Well, apparently no one planned any information security with the super collider. I love the quote from this guy who is obviously not a security guy “We don’t know who they were but there seems to be no harm done.” Right. No harm done. We’re sorta sure. Time to buy a tin-foil hat.


The Security Show: Episode Two – Stopping James Bond (Part IV)

This is the last of Episode Two and I hope everyone has been enjoying this interesting session with the FBI. In this final session, we wrapup and get a few comments from the audience. Good stuff.   Next time, I’ll be posting Episode 3 titled “Gate, Guards, and Guns” where we’ll spend some time talking…


The Security Show: Episode Two – Stopping James Bond (Part III)

I hope this is waking some folks up with regards to the huge issue that insider threat poses within your own company. We discuss some of the common characteristics that these people show and how we identify them. What are some of the triggers that make these folks turn against you? What are the warning…


The Security Show: Episode Two – Stopping James Bond (Part II)

In this part, we get some good advice from the FBI on how to have that talk with your executives who like to travel out of the country and don’t really understand the risk that they assume when they carry that laptop, cell phone, or other electronic device with them. Good stuff!


The Security Show: Episode Two – Stopping James Bond (Part I)

I got it to work! I had some issues with the video playback in Silverlight after it came out of post-production in Sony Vegas. I really wish there was an easy way for Expressions Encoder to sort of “save your profile” so you wouldn’t have to go and tweak settings each and every time. Pretty…


2008 Crimes Against Children Conference

Last week I had the honor of attending the 20th Annual Crimes Against Children conference, hosted by the Dallas Children’s Advocacy Center and the Dallas Police Department. It is billed as “Providing Professionals the Instruction, Information and Strategies They Need to Protect Child Victims and Prosecute their Offenders.” This is an amazing event geared towards…


The FBI Celebrates it’s 100th Anniversary!

I had the distinct honor this week, of attending the Bureau’s 100th Anniversary celebration event here at the Dallas FBI Field Office. (I’m the one that’s not blurry in the picture on the left) The event itself was very well done and the speeches by both Special Agent in Charge Casey and by Sen. Kay…


Meet The Feds: Part 3…..Understanding the Coming Threats

This is the last 10 minutes of Day 1 at TechEd 2008 for Agent Lynd and I. In this wrapup, Agent Lynd covers some of the trends in the security landscape and some of the things that IT Pros need to be to be watching for going forward. Next time I’ll load up the video…