Posts

First Amendment and Free Speech Online

Image
"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances."





That's it. That's all the United States Constitution's First Amendment actually says.

There's a lot in just those few sentences, and it's crucial to know when and how it applies to common situations. Especially given the widespread use of Social Media.

For examples of First Amendment arguments presented by constitutional law expert, Lata Nott, executive director of the Newsium Institute's First Amendment Center, follow this link:

http://www.cnn.com/2017/04/27/politics/first-amendment-explainer-trnd/index.html










Digital Identity Guidelines

Image
"Digital Identity" is the unique representation of a subject engaged in an online transaction.

"Identity Proofing" establishes that a subject is actually who they claim to be. 

"Digital Authentication" is the process of determining the validity of one or more authenticators used to claim a digital identity. 

Authentication establishes that a subject attempting to access a digital service is in control of the technologies used to authenticate. For services in which return visits are applicable, successfully authenticating provides reasonable risk-based assurances that the subject accessing the service today is the same as the one who accessed the service previously. Digital identity presents a technical challenge because it often involves the proofing of individuals over an open network and always involves the authentication of individuals over an open network. This presents multiple opportunities for impersonation and other attacks which can lead to fraudule…

“...no one can hack my mind”: Comparing Expert and Non-Expert Security Practices”

Image
Originally published two years ago by a team of three researchers from Google, I encountered this paper again at a conference I recently attended about how to deal with ransomware threats. Their findings provide excellent advice for everyone and I thought it would be good to share it again.

The paper discusses the results of two surveys: One involving 231 security experts, and another with 294 web-users who are not security experts. Both groups were surveyed about what they do to stay safe online. The intent was to compare responses from the two groups in order to better understand any differences in professional’s and casual user’s approaches to security.

Here are the top 5 practices by group:

Security Experts Non-Experts 1. Install Software Updates 1. Use Antivirus Software 2. Use Unique Passwords 2. Use Strong Passwords 3. Use Two-Factor Authentication 3. Change Passwords Frequently 4. Use Strong Passwords 4. Only Visit Known Websites 5. Use a Password Manager 5. Don’t Share Pers…

SANS Network Security Conference 2017 Las Vegas, NV September 10-17

Image
“Established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world. A range of individuals from auditors and network administrators, to chief information security officers are sharing the lessons they learn and are jointly finding solutions to the challenges they face. At the heart of SANS are the many security practitioners in varied global organizations from corporations to universities working together to help the entire information security community."

"SANS provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and networks against the most dangerous threats - the ones being actively exploited. The courses are full of important and immediately useful techniques that you can put to work as soon as you return to your offices. They were developed through a consensus process involving hundreds of administrat…

What you need to know about the WannaCry Ransomware

Image
A virulent new strain of ransomware known as WannaCry has hit hundreds of thousands of computers worldwide since its emergence on Friday, May 12. WannaCry is far more dangerous than other common ransomware types because of its ability to spread itself across an organization’s network by exploiting a critical vulnerability in Windows computers, which was patched by Microsoft in March 2017 (MS17-010). The exploit, known as “Eternal Blue,” was released online in April in the latest of a series of leaks by a group known as the Shadow Brokers, who claimed that it had stolen the data from the Equation cyber espionage group.

Source: Symantec




Windows 10 Creators Update

Image
Redmond magazine reports that Microsoft's second major Windows 10 upgrade will literally change the way users look at PCs, devices and games. Windows 10 Creators Update, which Microsoft started pushing out to consumers in April, will be available for business and enterprise customers this summer. Microsoft is emphasizing that this release, focused more on creating rather than consuming content, represents the first release that makes Windows an alternative to the Apple Mac OS, while aiming to appeal to young computer users who feel Apple has fallen behind.

"We designed Windows 10 to empower the creator in all of us," said Yusef Mehdi, corporate VP of the Windows and Devices Group at Microsoft. "To us, that means that everyone has the power to dream big, whether that involves starting a company, developing a lesson plan, inventing a product, developing or broadcasting games, or imagining a whole new world in Minecraft or mixed reality."
The Creators Update will…

CES 2017 to Feature 5G

Image
This year’s Consumer Electronics Show will feature 5G technologies. But it remains to be seen whether the technology will live up to the level of hype surrounding it.

CES 2017 kicks off this week in Las Vegas, and will attract technology companies from every spectrum. Topics will range from high-definition TVs to cutting-edge wireless technologies. More than 100,000 attendees from all over the world make CES the tech industry’s main trade show.

This year, a wide range of companies are poised to place 5G front and center. Qualcomm’s CEO Steve Mollenkopf will make 5G a centerpiece of his keynote address on Friday, while executives from Verizon, Ericsson, Sprint, 20th Century Fox Film Corp., SK Telecom and others will also discuss the move to the next-generation technology in a number of different CES panels and sessions.

Further, Intel and Ericsson have promised to show off a 5G virtual reality sports demonstration using Intel’s Voke 360 camera and Ericsson’s pre-standard 5G technology…