Richard Rushing, AirDefense CSO, on Wireless Security
by Mirko Zorz - Tuesday, 27 February 2007.
At the recent RSA Conference 2007 in San Francisco, AirDefense was doing wireless airwave monitoring. AirDefense found more than half of the 347 wireless devices susceptible to "Evil Twin" types of attacks, combined with some of the latest zero-day attacks. In this 8 minute video you'll get a picture of the wireless (in)security at a show where security professionals meet as well as some advice on how to get more secure.
35 percent of employees would sell information on company patents, financial records and customer credit card details if the price was right. This illustrates the growing importance for organizations to deploy data loss prevention strategies.
Sun Tzu's writings have been studied throughout the ages by professional militaries and can used to not only answer the question of whether or not we are in a cyberwar, but how one can fight a cyber-battle.
Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.
There is still way too much apathy when it comes to data-centric security. Given the sensitive data the OPM was tasked with protecting, it should have had state-of-the-art data protection, but instead it has become the poster child for IT security neglect.