Quantcast
Channel: General Security – The Security Blog
Browsing all 14 articles
Browse latest View live

California’s New Privacy & Breach Notification Law: SB 20

  The California Assembly passed a new Breach Notification Law.   This proposed law, called SB 20, will become effective if and when California’s Governor, the Schwartzenator, will sign it into law....

View Article



How to Create a Privacy Policy | Part 5

This entry is part of a wonderful series, [slider title="How to create a Privacy policy"]Entries in this series:How to Create a Privacy PolicyCreating a Privacy Policy IICreate Privacy Policy How-To:...

View Article

Comments on 201 CMR 17:00

  Readers of my blog know that I was a big supporter of Massachusetts Breach Notification proposed law, 201 CMR 17:00.     You may also have known that I authored an article, together with Ken...

View Article

Evolution of Defense in Depth

בע"×” Evolution of Defense in Depth As security professionals will tell you, one of the basic principles of a good security program is the concept of Defense in Depth.  Defense in Depth is arguably...

View Article

201 CMR 17:00 A New Dawn

Back in early September, I shared with my readers that I sent a letter (you can see it here) to the Massachusetts Office of Consumer Affairs and Business Relations, OCABR, with suggestions to improve...

View Article


The Needed Rebirth of Security

A Brief History of Internet-Time When we look at our (over-)connected life today, it is hard to remember that only ten years ago, some of us had no Internet.   When we look at legislative efforts, such...

View Article

Proposed Changes to HIPAA / HITECH, Part I

On July 8, 2010, the Office of Civil Rights (OCR) of the Department of Health and Human Services (HHS) issued its long awaited (and for some, dreaded) proposed changes to HIPAA.   While several of the...

View Article

Thoughts on Intel’s “Global Digital Infrastructure Policy” document

  On July 16, 2010, Intel released a thought and policy document titled "Global Digital Infrastructure Policy".   In this document, Intel shared with the readers what it has been doing regarding...

View Article


How To Stop G+ Searches in Google

Those who follow my blog know that few things are as important to me as Privacy. When Google launched last week their new ‘personalized with Google+’ results, I found it to be aggravating, to say the...

View Article


SEC Guidance Regarding Disclosure of Information Security Risk

  With the US economy in danger in 1933, almost 100 years ago, two laws were passed to perform important tasks.  On the one hand, to calm and reassure a desperate public that future investments by...

View Article

SCADA – and now for something new…

Almost three and a half years after I published The SCADA Scandal, and over a year after The Biggest Hole – Keeps Getting Bigger, it seems that something is finally being done. Over the last weekend,...

View Article

US President Obama calls for stronger Cyber Security laws

Today, US President Obama called for stronger Cyber Security laws.   It is interesting to note that theme used today emphasizes an action I called for in my paper (and later blog entry) ‘A Strategy To...

View Article

The US President’s Proposal for Cyber Security Information Sharing Legislation

Yesterday’s blog entry talked about the US President’s call for legislation to enable more sharing between Private industry and the Government of certain Cybersecurity events. Today’s entry will...

View Article


Thoughts about NATO and RUSSIA

Today’s blog is about what must be the single most disconcerting events of the last year.  In continuation of the Putin vs. Stoltenberg, it was announced today that NATO bolsters Eastern Europe against...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images