Home » Archives by category » CyberSecurity » ThreatIntel

Digital Memorial Tribute to Martin Dipo Zimmermann

Share This Post

He believed that the STIX/TAXII protocols for threat information sharing was the last best hope we had to facilitate human-to-machine and machine-to-machine threat intelligence sharing. He believed that this sharing among trust circles within the US, Europe and all the NATO countries, and between the public agencies and private…

Security Standards Council: New QIR Training

Share This Post

Point of Sale (POS) manufacturers, integrators and re-sellers may now take an on-line training program and on-ground test through the Security Standards Council to become certified for installations. …

Some Case Law on the Use of Social Media

Share This Post

Case law is emerging on the use of social media in resolving disputes. Here is a summary of some recent cases. …

Social Media and Data Integrity

Share This Post

How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question. …

Cyber Security for the Rest of Us

Share This Post

Jane Ginn is available to speak to your club or agency on how to secure your computers and networks to avoid being victimized by cyber crime.  She outlines in clear, understandable terms what the current risks are and how you can manage your systems to protect yourself, your family and…

Cybersecurity for Real Estate Agents

Share This Post

Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and networks to ensure they have the latest and greatest bells and whistles to keep them safe online. For this reason I’ve been giving a series of in-person…

Tragedy of the Cyberspace Commons

Share This Post

Two sides are battling for your mind and soul on the Internet. Which camp do you fall in?…