jump to navigation

CyberEspionage (Again)…The Counter Terrorist Magazine February 19, 2014

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , ,
add a comment

ctmay2012In light of the continuing attacks against companies by Eastern European organized criminal groups, I thought it appropriate to remind everyone that state sponsored attacks are still a major issue.  Here is a link to an article I wrote in The Counter Terrorist Magazine on the topic of CyberEspionage.  “The economics of cyber-theft is simple: Stealing technology is far easier and cheaper than doing original research and development. It is also far less risky to the spy than historic cloak and dagger economic espionage.”

Chris Mark in February 2014 SC Magazine “The Need & the Challenge” February 14, 2014

Posted by Chris Mark in Uncategorized.
Tags: , , , , , ,
add a comment

2014SCMagazineChris Mark’s (this author) article “The Need and the Challenge” has been published in the February, 2014 edition of Secure Computing Magazine.  The article focuses upon the need to define the term ‘security’ and the challenge associated with denoting such a term.   Here is an intro “While used every day, the term “security” can be deceptively difficult to define and may contain various meanings to different people in divergent contexts. The industry at large seems to have adopted a stance of “I know it when I see it,” as opposed to objectively defining the concept. Unfortunately, this creates numerous problems for those who have a need to ‘secure’ data, or any other asset.”  Continue reading here! 

Chris Mark in September 2013 – SC Magazine (Interview and Article) August 21, 2013

Posted by Chris Mark in cybersecurity, Industry News, PCI DSS.
Tags: , , , , , , ,
add a comment

sclogo_4In the August, 2013 edition of Secure Computing Magazine (SC Magazine), I have an interview and article included.  The interview is for the cover story called “Beyond the Checkbox; PCI DSS” and the article is called “Understanding Parallax and Convergence to Improve Security”.   Below is an excerpt from the article..be sure to check them out!

“To address today’s threats, companies require a high degree of convergent perspective, information expertise, and coordination between personnel and groups. Previously, companies could “make do” with basic security controls such as firewalls, Intrusion Detection System (IDS), and anti-virus. Attempting to understand the threats facing an organization and analyzing risk was often an afterthought, as companies relied upon simple compliance matrices and lists of “best practices” to secure their environment. This is no longer sufficient to address the threats of 2013.  A major mistake in information security implementation is what can be referred to as “security parallax.””

How to choose a VPN that will protect your privacy (Guest Post by IVPN) June 2, 2013

Posted by Chris Mark in Uncategorized.
Tags: , , , , , ,
add a comment

logo@2xThis article is written by Christopher Reynolds, head of business development at IVPN – a VPN service, and EFF member, dedicated to protecting users’ online privacy.  I don’t often allow guest posts but Mr. Reynolds and IVPN have done a great job of providing valuable info.  Certainly worth taking a look!

Online privacy is coming under increasing attack from governments around the world. Legislation such as CISPA in the US, the CCDP in the UK and Australia’s data retention proposals, have generated real worry among privacy-conscious internet users over our law enforcement’s desire to increase their powers of surveillance to unprecedented levels. This culture of fear is driving more and more people toward commercial Virtual Private Networks (VPNs), which promise to protect user data and offer online anonymity. But choosing a VPN that actually protects privacy is not straightforward. In this blog post I will go over the key issues you must consider before signing up to any VPN service.

Data retention

The biggest issue when it comes to using a VPN in order to protect your privacy is data retention. Government surveillance is primarily facilitated by the data retention policies of your ISP. In Europe your ISP’s data retention policy is mandated by the EU Data Retention Directive, which forces all European ISPs to retain users’ personal information for between 6 months and 2 years after the user leaves the ISP’s service. This data includes web logs, which essentially means a record of every website you’ve visited and the times you visited them. The data your ISP holds won’t typically contain email logs – despite popular perception- unless you use your ISPs own email service. But it will include which third party email services you use and when you’ve used them. (more…)

Chris Mark & Heather Mark in Feb 2013 TransactionWorld February 1, 2013

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , , ,
add a comment

Feb%20CoverFebruary’s edition of TransactionWorld was released today and both Chris and Heather have articles in the issue.  Chris (that is me) wrote “Security in Dangerous Waters; Pirates & CyberCrime” while Heather wrote “Shifting Targets; Dealing with Regulatory Shifts in Data Security & Privacy”.   Please be sure to check out the articles..

%d bloggers like this: