Wow – just learned about this – fascinating.  It’s almost obvious after you consider how it was written – but only obvious after you have read about it!   From the ZMap Web-Site:  https://zmap.io/ ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a […]

Read More →

Bradley Manning, the US Soldier who previously leaked hundreds of thousands of Secret and Top Secret US Government documents, was sentenced by a military court today (21 August 2013) to 35 years in prison and a dishonorable discharge.  Although he can be out in about 7 years if he behaves (taking into account time served), […]

Read More →

                Or it may not be.   But It Doesn’t Matter.     Your hard drive could crash and permanently destroy all of your family pictures. You could accidently use your hair dryer while standing in a puddle in your bathroom. Somebody could walk into your house and steal your belongings. But […]

Read More →

Last week, the US Department of Health and Human Services released the Final Rule to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules under the HITECC and GINA Act.  This 550+ page document provides details and explanations in four different areas.   Some of the highlights include: First, the Breach Notification clause was modified from […]

Read More →

Looks like Google is offering a pretty awesome on-line (and FREE) course on power searches on Google that spans a couple of weeks, includes some activities and on-line coursework, and even a certificate at the end. I just signed up – more info available on Google at: http://googleblog.blogspot.ca/2012/06/become-google-power-searcher.html Not sure how long the sign-up will […]

Read More →

Social Network On-Line Protection Act!   Has anybody heard that yesterday, 27 April 2012, NY congressman Eliot Engel introduced SNOPA, legislation intended to protect users of social networking from having to give employers (or potential employers) and schools access to their personal social networking sites. The Social Networking Online Protection Act would restrict current or […]

Read More →

Apparently, that is the question that is being asked these days during interviews. Wow. My first response is “No”. According to Reuters: Studies have shown that Facebook can be a useful hiring tool. Just a 5- to 10-minute perusal of a user’s profile can net more information than a basic personality test. It’s no wonder […]

Read More →

I’ve seen quite a few vendors recently selling or at least offering up products and services that help reduce your Privacy Risk. What types of software do you consider to be “Privacy Software”? Solutions to help manage your data discovery / identification / flows? Privacy Incident Response Management Software? Safe Harbor Certification Processes and Procedures? […]

Read More →

The NJISACA Organization (www.njisaca.org) is presenting CISM and CISA training in March and April in preparation for the June exams. Please contact cism@njisaca.org or cisa@njisaca.org for additional information. The CISA Preparation / Review course is over five Saturdays and the CISM Preparation / Review class is just four Saturdays and helps prepare you for either […]

Read More →