Government emphasis on compliance drives another security acquisition

Enterprise security giant Symantec announced yesterday that it will acquire the privately held vulnerability assessment and security compliance vendor Gideon Technologies. While Gideon focuses on commercial markets such as financial services and health care as well…

Information sharing actions in the name of national security test international privacy laws

The Secure Flight program recently implemented under the authority of the Transportation Security Administration (TSA) is raising a number of privacy issues not just in the United States, but also in foreign countries whose privacy laws…

Continued focus on compliance rather than effectiveness is driving the market

In a story widely reported last Monday, enterprise software giant EMC Corp. announced its pending acquisition of the private company Archer Technologies, a vendor of IT governance and compliance solutions. EMC plans to make Archer part…

Looking ahead for 2010

We launched this blog a year ago today, as an adjunct to our SecurityArchitecture.com website. It took us a few months to hit our stride, but in the past few months we’ve become not only more…

Information sharing imperatives may trump security

While the technical infrastructure required to support information sharing don’t really change from context to context, security and privacy requirements applying to senders and receivers of information do vary quite a bit depending on the domain….

The need to encrypt wireless data is a lesson still being learned

The Wall Street Journal published an article on December 17 reporting that the U.S. military has discovered that wireless video feeds from unmanned Predator drones operating in Iraq are often intercepted by enemy insurgents. The ability…

Data loss lessons from TSA disclosure

As reported on Wednesday in the Washington Post and elsewhere, the Transportation Security Administration (TSA) inadvertently disclosed sensitive information about its airline passenger screening practices by posting a document containing this information online. The mistakes involved…