Attempts by the federal government to constrain the collection of data, and the ability to tailor offers based on this data, is a case of the government meddling in areas where it has no place. Interference with the free market serves only to punish those companies that know how to efficiently mine their data and so is the worst form of government interference with the free market.
Cyber terrorism continues to bubble below the surface, with no large-scale effort to squash it, because there hasn’t yet been a major, defining attack.
My opinion is that ISPs should be provided with a safe-harbor exception from liability so that they can provide so-called “clean pipes” to Internet peer points. In effect, the ISPs should be able to monitor the traffic on their network for botnets and other hostile activity and disconnect these systems as a matter of daily business activity.
Michael C. Theis has more than 25 years of experience as a counterintelligence special agent and 30+ years of concurrent work in computer systems engineering. He directs cyber threat management strategies for detecting and combating trusted insider threats to the federal government and private sector. Identity Week recently spoke with…
I contend that there is no place for the concept of “trust” in IT security. Trust, as it relates to business security, is a wholly unreliable concept because of human nature and the laws of unforeseen consequences.
Now we’ll explore solutions that some of the best-managed casinos have deployed to protect their most sensitive data and IT assets.
Last weekend the Washington Post published an analysis showing how the notorious Stuxnet worm could become the model for a cyber attack on US infrastructure. The article quotes former US energy regulators and industry experts who share concerns about future cyber weapons that use Stuxnet as the blueprint to cause devastating…
When it comes to handling insider security threats, casino industry IT professionals face challenges that set them apart from peers in other markets.
The article includes details of how Commerzbank – Germany’s second largest banking institution – safeguards its infrastructure from insider threats using a combination of Enterprise Random Password Manager from Lieberman Software and ArcSight Enterprise Security Manager.
The important thing to know is that Identity and Access Management (IAM) systems generally don’t provide either PIM or PUM capabilities since privileged identities are associated with hardware and software assets, and not with the individual user identities controlled by IAM.