So, I snuck into San Francisco two days early this year, thinking I'd enjoy some quiet time in the press room of the Moscone Center on the eve before the real kickoff of the 2010 RSA Conference.
Boy, was I wrong.
The call to aid the devastated country of Haiti came just hours after a 7.0 earthquake hit the impoverished Caribbean island on Tuesday.
Just as quickly as the tweets came in asking for donations, so too came the cyber criminals looking to divert funds from legitimate charities to their own pockets.
Earlier this week, I blogged on what have been the most popular interviews I've conducted in 2009 - and there have been a lot of them.
Today I'd like to talk about my favorite interviews of the year. And there have been a magnificent seven of those.
Government and business must think creatively to help safeguard America's digital assets, says Melissa Hathaway, the former White House acting senior director for cybersecurity who led President Obama's 60-day cybersecurity policy review.
Hathaway, an interview with GovInfoSecurity.com, cited the innovative...
After fingerprints, iris recognition is the second most supported biometric characteristic, and its popularity as a means of authentication is growing.
Patrick Grother is among the computer scientists at the National Institute of Standards and Technology's Information Technology Laboratory who are collaborating...
Quick heads-up to those of you who will be in the Boston area this week: The BAI Retail Delivery Conference & Expo starts Tuesday at the Boston Convention & Exhibition Center. I'll be in attendance on Weds and Thurs, and I'd welcome the opportunity to meet you.
This month didn't slip out of my scope, but it's already October 15 -- halfway through Cybersecurity Awareness Month, designated for the last six years as the month when the public relation arms of security vendors, governors of states and other political types with predetermined agendas set forth to right a whole...
There is no such thing as the hack-proof computer.
Once we accept that reality, the next challenge is to acknowledge that a certain amount of IT risk is a part of conducting business. Risks also come in many different forms. I'm often asked which is worse -- regulatory, policy or compliance risk? I believe it may...