M.E. Kabay

Synchronization software: Synctoy revisited

Data synchronization for two tower computers and a laptop is a daily routine for me. MAIN tower is in my home office; SPARE tower is in my university office; Norwich University supplies me with a laptop computer as well. For the last...

The BP case: Online reputation management

Recognizing that the surge of media coverage and Internet postings was growing at a faster rate than the oil plumes, BP moved quickly to mitigate the damage began damage control – for its reputation, that is.

Dishonest methods involving online reputation management

Search engine optimization (SEO) to raise the visibility of a specific company or person can involve questionable methods. For example, search engines can be manipulated to trick Web crawlers and increase the visibility of Websites to...

Online reputation management: Manipulating search engines

Online reputation management (ORM) works much in the same way: accentuating the positives and giving the impression of mass approval.

Disintermediation affects reputation

Reviews from satisfied and dissatisfied customers and clients are posted on a wide range of sites on the Web; typing "consumer reviews" as a search term (including the quotation marks) in Google produces over 73 million hits. Some...

Planes, cats & mosquitos: The power of metaphor

Everyone knows that one of the keys to getting projects planned and underway is to define each project’s scope. Scoping a project, at minimum, is defining the project's purpose, stakeholders, and delivery date, and then determining...

Sexting: Loss of control = Embarrassment, bullying & potential prosecution

In the first column of this pair of postings, I introduced a discussion of the widespread and increasing practice by young people of sending lewd text and pornographic photos or videos of themselves to friends – only to find the...

Sexting: Pervasive cameras + Internet = Autoporn

Got kids? Think they're too sensible to send nude or seminude pictures of themselves to their buddies?

Accessible backups, not recursive backups

Recently my PGP Desktop encryption program suddenly lost its registration information. I don't know why, although it may have had something to do with a series of driver updates, but when the system rebooted at one point, I noticed a...

Can you comply with court orders for data from the cloud?

The very nature of cloud storage, and one of its selling points, is that the cloud is dynamic. You only use what you need and shut down what you don’t.

Is your company ready for legal holds and compliance with mobility and the cloud?

It has not been too long since Google lost millions of e-mails and struggled to get most (!) of them back for customers. Amazon recently had cloud issues where they were not able to restore all the data their cloud customers had...

Does your security policy reflect mobility and cloud security?

Recently I was at a technical meeting and overheard a client say that even though this area had just recently suffered a great deal of damage from several tornados, businesses are still very reluctant to develop or test Disaster...

Is your company ready for 4G mobile connectivity?

We will increasingly see users challenging (in every sense) our ability to protect data – and comply with laws such as the Health Insurance Portability and Availability Act (HIPAA) as the move to mobile computing continues.

Is the operating system dead?

One of the problems dismaying information assurance professionals today is the avalanche move towards mobile devices taking over computing for most users. A recent study predicts "U.S. mobile handset data traffic will grow from 8...

Don't MISs Bidgoli's Second Edition: Even Better

Last year I called Professor Bidgoli's MIS 2010 college textbook "the missing link in college education" preparing students for real life applications of computer science and information systems. Professor Bidgoli released the second...

Too much access to the Internet?

After the President of the United States announced that Osama Bin Laden had been killed, published reports revealed how the terrorist leader accessed the Internet to send e-mails without being intercepted by U.S. intelligence...

Securing the eCampus 2011

Education has special needs for information security. Tom Candon and Adam Goldsmith have both deeply involved in organizing one of my favorite conferences, Securing the eCampus. I recently interviewed Tom and Adam for Network World.

Experts risk indigestion without RISKS DIGEST

In the last article, I got sidetracked into demonstrating that the number of articles published every year about security issues has been growing steadily for the last 30 years. Today I'll remind readers of (or perhaps introduce...

Don't dismiss community college grads with degrees in information assurance

The CAE2Y program was established to meet the needs of cybersecurity professionals – not all of whom have baccalaureates and advanced degrees. Zdravkovich emphasized that our society needs all dimensions of diversity in the...

All the news that hits the print

One of the problems facing security personnel is that the number of  published reports on vulnerabilities, exploits and successful attacks is growing so fast that it's difficult to keep up.

Load More