Towards the end of January 2022, the Office of Management and Budget (OMB) released its memorandum on moving government agencies to a zero-trust model. Enterprises that align themselves to industries regulated by the federal agencies can take a cue from it to improve their security posture. The memo considers the recent ransomware attacks on various… Continue reading Cues from OMB Zero Trust Architecture memo
Disk Overwrite or Wipeout Best Practice
An online search shows majority of tools available for wiping out data on a disk points to a practice of 7 wipes. They believe that it is a US DoD requirement. Some of them support the Gutmann method of 35 wipes. However, I could not find any documentation on US government website that indicates seven… Continue reading Disk Overwrite or Wipeout Best Practice
India’s Unique ID Use Case
Nandan Nilekani’s…..Fully integrated ID card system for Indian citizens!!
The Open Group Security Practitioners Conference Day 1
Proceedings from the The Open Group Security Practitioners Conference at Toronto – July 22, 2009.
Internet Traffic Shaping in Canada
ISPs wants to shape internet traffic while Canadians are still waiting to know the effects on Privacy if two bills – Investigative Powers for the 21st Century Act and the Technical Assistance for Law Enforcement in the 21st Century Act – becomes law.