Blogs

  • Supreme Court Weighs in On Privacy of Workplace Communications

    by Stephen Wu on June 24, 2010

    On June 17, 2010, the United States Supreme Court issued a ruling in the highly-anticipated case of City of Ontario, California v. Quon. The case concerned a City of Ontario police officer, Mr. Quon, who used a City-issued pager for sending explicit text messages, and whose communications the City discovered when it audited usage in a review of the cost of the pagers. The Court ruled that the City…

  • Outsourcing SAP Operations

    by Ben Rothke on June 21, 2010

    A common mistake made when outsourcing, is that organizations often think if they outsource a poor process, it will magically start working once it is outsourced. Nothing could be further from the truth. In Outsourcing SAP Operations, Yosh Eisbart shows that there is indeed no magic involved, rather good requirements definition. While he has no wand, does show the way in which to effectively…

  • The Psychology of Safety

    by Ben Rothke on June 18, 2010

    Left Seat: The Psychology of Safety is a brilliant article from the June 2010 issue of Flying magazine by J. Mac McClellan. While the article is on aviation safety; the keys point, namely about predicting risk, is completely relevant for anyone in the information security field. THE GENERAL AVIATION safety record has changed very little in decades despite continuous efforts by regulators and the…

  • Fair use, plagiarism and the World’s No. 1 Hacker book

    by Ben Rothke on June 14, 2010

    O'Reilly Media is one of the premier technology publishing companies, who like all serious publishing houses have strong policies and guidelines regarding plagiarism. They also have a Missing Manuals series of books. The goal of the Missing Manual series, is to “produce sterling, beautifully written manuals for popular consumer software and hardware products” So with license, perhaps this post…

  • How To Become The Worlds No. 1 Hacker

    by Ben Rothke on June 10, 2010

    [For an update to this issue and a comprehensive list of the plagiarized text, see Fair use, plagiarism and the World’s No. 1 Hacker book] When I first saw the title of How To Become The Worlds No. 1 Hacker by Gregory Evans, it reminded me a pitch I get from people trying to hawk Amway. But just as there is a limit to the amount of people who can buy and sell soap, there can only be a single #1…

  • Webinar June 29 - Effective Data Destruction Practices

    by Ben Rothke on June 9, 2010

    I am giving a webinar on June 29 (reschedule from June 8) on 'Effective Data Destruction Practices' at 10:00AM Pacific, 1:00PM Eastern, for O'Reilly Media. Changes in data storage technologies, new Federal and State data privacy regulations and other factors have created an urgent need to have effective electronic records destruction practices. This session will detail the specifics of these…

  • Webinar June 8 - Effective Data Destruction Practices

    by Ben Rothke on June 3, 2010

    I am giving a webinar on June 8 on 'Effective Data Destruction Practices' at 10:00AM Pacific, 1:00PM Eastern, for O'Reilly Media. Changes in data storage technologies, new Federal and State data privacy regulations and other factors have created an urgent need to have effective electronic records destruction practices. This session will detail the specifics of these changes and how organizations…

  • Is the oil industry due for a little cyber security attention?

    by Gib Sorebo on June 1, 2010

    The legal profession is often seen as having the rather dubious distinction of seeking to profit at the misfortunes of others or, more simply, of being ambulance chasers. As law graduate myself, I don’t dispute that many practicing lawyers get rather aggressive around accident sites. Nonetheless, much of the profession’s bad name derives instead from the highly valuable function they perform, …

  • New Jersey Law on Interception of Internet Communications

    by Stephen Wu on May 27, 2010

    In October, New Jersey enacted cybercrime legislation signed by Governor Corzine authorizing the interception of wire or electronic communications of “computer trespassers.” A 3761 (2009). For a copy of the legislation, click here. Under A 3761, persons acting “under color of law” are authorized to “to intercept the wire or electronic communications of a suspected computer trespasser transmitted…

  • Books from SAP Press

    by Ben Rothke on May 25, 2010

    I recently came upon SAP Press, an imprint that seems somewhat new. They focus on titles around SAP and NetWeaver. They have a number of books on risk and compliance – see http://www.sap-press.com/categories/Governance%2C-Risk%2C-and-Compliance, which seems to be of value for anyone needed to secure or audit an SAP environment. There does not seem to be any titles specifically around SAP security;…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 02 Sep 2014 07:41:36 -0400.
© 2014 EMC Corporation. All rights reserved.