“Non-Observables” standard

Security professionals are fraught with crazy obstacles unseen in other parts of the technology space. For example, we are often fighting enemies we cannot see. They out-maneuver us by attacking our partners, informational supply-chain, and even the people. But they are not completely invisible if we know what to look for. There was a recent thread on the SIRA mailing list that discussed the concept of “non-observables,” or elements in the security space that cannot be feasibly observed by defenders. These elements, in theory, would be critical in event detection, thus providing defenders with better capabilities to shrink the window of vulnerability. This is a foolish notion that leads security people into an unnecessary state of helplessness. Consider Locard’s Exchange ...

Continue Reading

September 2012 Roundup standard

What was popular in September? Well, we certainly couldn’t get enough of the new iPhone (and by the way, I think Samsung’s commercials are ABSOLUTELY GENIUS!). We enjoyed cooler weather for all, and a fantastic Oktoberfest. We had the PCI North American Community Meeting kick off a whole new round of discussions on everything that is right (and wrong) with PCI DSS. Oh yeah, and good ol’ Brando forgot to renew the domain, so the site was down for a couple of days. It’s back up now, so we can all rejoice and be glad. Here are the five most popular posts from the last month: PCI DSS Feedback 2012. The Council released some highlights from the feedback process including ...

Continue Reading

The Dissolving Perimeter standard

IT and IS professionals have long acknowledged and lamented the dissolution of the network perimeter amid a global economic crisis and shrinking IT budgets. We must do more with less, be more efficient, and create and leverage economies of scale and scope to achieve all of this. But that doesn’t necessarily represent why the perimeter is dissolving, so what is going on? Businesses are exchanging information in real time (both providing and consuming) over public networks as opposed to frame relay or MPLS links behind the scenes. The number of telecommuters ((The State of Telework in the US – Five Year Trend and Forecast.)) in the US grew 61% from 2005-2009. This means more laptops over desktops, and now more ...

Continue Reading

RSA Announces Advanced Cyber Defense Service standard

A very long time ago I worked at a company called Internet America. For those that remember, we were the 1-800-Be-A-Geek company. Back on the early side of the Internet explosion (this is 1996) I remember walking into server rooms in absolute awe of the big machines that powered our customers’ experience and the respect I had for those that ran them. One particular guy I remember is Gordon. Gordon was a typical middle-aged geek (before it was chic) and he had a catch phrase that always made me smile. When you asked Gordon how he was doing, he would say, “The bugs are winning today.” Back then, we had a lot of days like that. Over the last two ...

Continue Reading

The Only Customer Service Script You Will Ever Need standard

I have had a few run-ins with some customer service departments in the last month that drove me a bit crazy (and one that went QUITE well). There are several indicators that the economy is getting better; one of those being as the economy gets better, customer service gets worse. There is apparently less of a need to deliver service because if I defect, there are others waiting in line to take my spot as a “valued customer.” I’ve always scratched my head when people talk about how big-box retailers kill small businesses. I disagree. I think it forces small businesses to both innovate and fill the service gap left by those big-box retailers. Small business owners that cannot retool ...

Continue Reading

PCI DSS Feedback 2012 standard

The PCI Security Standards Council released a statement this morning outlining some of the highlights from the feedback period we just finished this year as part of the PCI DSS lifecycle. If you are going to be at the community meeting next week (or later in October for EU), I strongly suggest you attend the session on the feedback and potential proposed changes to the standard (if they have the ability to turn that around this quickly). Here are a couple of notes from my analysis (note some of the wording is similar to the press release, go read it): Scoping is still an issue. I think we all agree that at some point the framers of PCI DSS will ...

Continue Reading

August 2012 Roundup standard

What was popular in August? We sure had our fair share of speculation on Apple products including a big settlement that could have lasting effects on the mobile device industry. We had a new OS released (with a ton of side effects). RSA China came and went (one of the more challenging speaking gigs I’ve ever had), and RSA 2013’s CFP closed. And while summer is winding down, it’s clear that infosec is not done for 2012! Here are the five most popular posts from the last month: Mountain Lion Troubles and Solutions. In a departure from the norm, the top post this month is all about Mountain Lion. Some folks had no problems, others like me had massive issues. ...

Continue Reading

PCI Hacks Going Global standard

Looks like non-US based merchants can start to shake in their boots a bit. I know this isn’t the first one outside the US (and not the biggest), but it seems like all we hear about are the ones here at home. So how big was this one? According to Wired, pretty big. 500K cards is not 95 million, but it’s certainly not a handful either. What I find interesting about this particular hack is not the number of cards or the source of the hack, but the fact that it wasn’t really advanced and much different from the majority of the small merchant breaches here in the US. The smoking gun comes from paragraph three: The company’s network used ...

Continue Reading

Guest Post: Different Kinds of Document Destruction standard

The following is a guest post by Andrew Morrell. The general public and businesses alike fret over how to dispose of their sensitive documents. Anything from a personal paper to PII/PCI data to an accounting sheet can be used by competitors or otherwise be a source of ridicule and liability. The difference for a business is that competition for real money is at stake. A large business can have thousands of pages to destroy. The choice is between small office shredders and professional services. While it might surprise some, there are enterprises that offer to haul away waste paper in fairly large trucks and use an industrial shredder. This is one way to dispose and recycle a mountain of business ...

Continue Reading

If I Derive PII/PHI, Does It Make A Sound? standard

The Big Data problem and solution is fascinating. In some respects it is incredibly powerful and has tremendous applications for humanity at large, but other implementations are frighteningly big brother-esque. If you hadn’t heard, Target knows you are pregnant before your family does. They do it by watching your behavior on their website. So the new question that we face is what do we do if we derive or create accurate PII/PHI in the normal course of learning about our customers? I’m worried that companies will recklessly create data about their customers in new ways never before possible, exposing we citizens to many privacy breaches. I’m doing research in this area now, and am very interested to see where this ...

Continue Reading