Worst Responders

Some years ago, I attended a training program sponsored by the United States Secret Service which was training cyber first responders such as state and local police departments, sheriff’s offices, county police, and other local law enforcement agents. I was struck by several things. First, how rudimentary the training was. Second, by the naiveté to think…

The post Worst Responders appeared first on SecurityCurrent.

Continue reading Worst Responders

When Disclosing a Data Breach is the Wrong Thing to Do

Inevitably, after a major data breach, when a company disclosed the fact of the breach, security professionals question the timing of the disclosure. “Why did you wait so long to make a disclosure?” is the outcry! Sometimes, like in the case of Uber, which delayed notification for almost a year, the criticism is warranted. But even when the…

The post When Disclosing a Data Breach is the Wrong Thing to Do appeared first on SecurityCurrent.

Continue reading When Disclosing a Data Breach is the Wrong Thing to Do

When Disclosing a Data Breach is the Wrong Thing to Do

Inevitably, after a major data breach, when a company disclosed the fact of the breach, security professionals question the timing of the disclosure. “Why did you wait so long to make a disclosure?” is the outcry! Sometimes, like in the case of Uber, which delayed notification for almost a year, the criticism is warranted. But even when the…

The post When Disclosing a Data Breach is the Wrong Thing to Do appeared first on SecurityCurrent.

Continue reading When Disclosing a Data Breach is the Wrong Thing to Do

iPhone X Facial Recognition – Human Emojis

I really want an iPhone X. It has lots of cool features: a headphone jack (oops), edge to edge display (well, almost edge to edge), and the ability to create anthropomorphic poop. What’s not to like? However, as with other technologies, advances are a double-edged sword; in this case, the face ID program. The newest iPhone abandons the…

The post iPhone X Facial Recognition – Human Emojis appeared first on SecurityCurrent.

Continue reading iPhone X Facial Recognition – Human Emojis

iPhone X Facial Recognition – Human Emojis

I really want an iPhone X. It has lots of cool features: a headphone jack (oops), edge to edge display (well, almost edge to edge), and the ability to create anthropomorphic poop. What’s not to like? However, as with other technologies, advances are a double-edged sword; in this case, the face ID program. The newest iPhone abandons the…

The post iPhone X Facial Recognition – Human Emojis appeared first on SecurityCurrent.

Continue reading iPhone X Facial Recognition – Human Emojis

Cell Phone Access at Issue in Texas Church Shooting Case

In the wake of the horrific shooting at a Texas church in November, law enforcement officials are attempting to obtain access to the contents of the suspect’s cell phone, according to published reports. The FBI Agent in Charge of the San Antonio Field Office responsible for the investigation noted, “With the advance of the technology and…

The post Cell Phone Access at Issue in Texas Church Shooting Case appeared first on SecurityCurrent.

Continue reading Cell Phone Access at Issue in Texas Church Shooting Case

Cell Phone Access at Issue in Texas Church Shooting Case

In the wake of the horrific shooting at a Texas church in November, law enforcement officials are attempting to obtain access to the contents of the suspect’s cell phone, according to published reports. The FBI Agent in Charge of the San Antonio Field Office responsible for the investigation noted, “With the advance of the technology and…

The post Cell Phone Access at Issue in Texas Church Shooting Case appeared first on SecurityCurrent.

Continue reading Cell Phone Access at Issue in Texas Church Shooting Case

Email Privacy “In Transition”

A recent kerfuffle between the Office of Special Prosecutor (OSP) Robert Mueller and lawyers representing the Presidential Transition Team (PTT) arose out of Mueller’s reported acquisition of the emails of the transition team from the Government Services Agency (GSA). Transition lawyers argue that the GSA provided Mueller’s team with emails that were subject to various privileges…

The post Email Privacy “In Transition” appeared first on SecurityCurrent.

Continue reading Email Privacy “In Transition”