Sunday, August 30, 2015

Aptitude Tests - National Security Database

Aptitude Tests - National Security Database: One of the simplest ways of understanding if you are fit for the domain is to quickly take an aptitude test.

Healthy skepticism - The Washington Post

....check original...

https://www.washingtonpost.com/opinions/healthy-skepticism/2015/08/29/0f3f086c-4dc2-11e5-902f-39e9219e574b_story.html

Cybersecurity is a 'con,' malware entrepreneur says

Cybersecurity is a 'con,' malware entrepreneur says: "John Prisco, CEO of Triumfant Security, wrote in a recent article for The Next Web that the cybersecurity industry is a "con" and that vendors are selling software that they know doesn't work."



'via Blog this'

Credibility of psychological theories or studies in question

Credibility of psychological theories or studies in question


http://www.natureworldreport.com/2015/08/the-way-people-think-or-act-is-beyond-the-reach-of-scientific-studies/

Suicide-risk behaviour patterns identified - study - BBC News

Suicide-risk behaviour patterns identified - study - BBC News

http://www.bbc.com/news/health-34101608

6 UK teenagers arrested for allegedly using Lizard Squad's Lizard Stresser DDoS service | Network World

6 UK teenagers arrested for allegedly using Lizard Squad's Lizard
Stresser DDoS service | Network World

http://www.networkworld.com/article/2977608/microsoft-subnet/6-uk-teenagers-arrested-for-allegedly-using-lizard-squads-lizard-stresser-ddos-service.html

Five signs an employee plans to leave with your company’s data | CSO Online

Five signs an employee plans to leave with your company's data | CSO Online

"Sales reps that had shown a spike in abnormal system activity between
weeks nine and 12 of a financial quarter generally quit at the end of
week 13..."

http://www.csoonline.com/article/2975100/data-protection/five-signs-an-employee-plans-to-leave-with-your-companys-data.html

HEALTHCARE IT: IS YOUR INFORMATION AT RISK? - ProQuest

HEALTHCARE IT: IS YOUR INFORMATION AT RISK? - ProQuest: "HEALTHCARE IT: IS YOUR INFORMATION AT RISK?"



'via Blog this'

What Is Next For Consumer Privacy As Data Continues To Proliferate - Millennial CEO

What Is Next For Consumer Privacy As Data Continues To Proliferate -
Millennial CEO

http://millennialceo.com/technology/consumer-privacy-data-continues-proliferate/?utm_content=bufferef487&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Wednesday, August 26, 2015

OPERATION LABSCAM

...As part of ongoing Labscam investigations authorities mounted "Operation Bad Bundle", investigating tests which were bundled together but then charged separately....

http://www.bmartin.cc/dissent/documents/health/labscam.html

Doctors hindered by company's gene patent | Science | The Guardian

......Doctors' ability to diagnose and study a debilitating disease caused by iron overload in the body is being hampered by the patenting of a key gene.

The disease, called haemochromatosis, affects up to 20,000 Britons and two common mutations in the gene known as HFE are thought to be responsible for 80-85% of cases of the illness.

http://www.theguardian.com/science/2002/feb/07/genetics.medicalscience

Tuesday, August 25, 2015

Friday, August 21, 2015

Conor Williams: Shut Down Student Data and Shut Out Lights on Ed Woes | The 74

Conor Williams: Shut Down Student Data and Shut Out Lights on Ed Woes | The 74: According to the Data Quality Campaign’s Rachel Anderson, “The biggest thing that this bill would do would be to keep states from using student-level data in their own data systems … to do most of the things that they do now, like early warning systems, high school feedback reports showing how graduates do after high school, and so on.”

Conor Williams: Shut Down Student Data and Shut Out Lights on Ed Woes | The 74

Conor Williams: Shut Down Student Data and Shut Out Lights on Ed Woes | The 74:



Vitter’s bill would make these changes in the name of privacy, but the bill is so broad that it would make it much harder for states to efficiently maintain basic oversight of their education systems. Instead of providing targeted changes to meaningfully protect children’s personal information, it provides vague, blanket prohibitions that would stymie the collection of basic student achievement data by educators who need it to evaluate their own work.

Start with Security: A Guide for Business FTC plus other links

Start with Security: A Guide for Business | Federal Trade Commission



Also:



https://www2.idexpertscorp.com/blog/single/know-your-enemy-the-new-economics-of-cyber-crime



and



https://www2.idexpertscorp.com/blog/single/half-of-americans-health-information-disclosed-in-data-breaches

Home - Mobile Health Summit 2016

Home - Mobile Health Summit 2016: From text messaging solutions to sensor technologies, this exclusive forum covers the key developments in mobile health. Refine your digital health strategies, engaging clinicians and patients alike.

Monday, August 17, 2015

U.S. Department of Justice Health Care Fraud Report | OPA | Department of Justice

.Bioran Laboratories of Cambridge, Massachusetts (now owned by Corning Inc.), paid the United States $6,675,000 to settle allegations that it routinely and automatically performed both an automated series of tests using a discrete analyzer machine, commonly known as a SMAC machine, as well as iron tests whenever a chemistry profile was ordered. Bioran was billing Medicare approximately $27 every time an automated series was ordered, instead of the appropriate $17...

http://www.justice.gov/opa/us-department-justice-health-care-fraud-report

Oracle EULA

ORACLE DOES NOT GUARANTEE THAT THE PROGRAMS WILL PERFORM ERROR-FREE OR
UNINTERRUPTED OR THAT ORACLE WILL CORRECT ALL PROGRAM ERRORS. TO THE EXTENT
PERMITTED BY LAW, THESE WARRANTIES ARE EXCLUSIVE AND THERE ARE NO OTHER EXPRESS OR
IMPLIED WARRANTIES OR CONDITIONS, INCLUDING WARRANTIES OR CONDITIONS OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.



http://www.oracle.com/us/corporate/pricing/olsa-ire-v122304-070683.pdf



'via Blog this'

Enterprise IoT to see 38 billion connected devices deployed by 2020

Enterprise IoT to see 38 billion connected devices deployed by 2020: "Connected devices are expected to reach over 38 billion over the next five years, according to new predictions, representing a 285% increase from the current figure."



'via Blog this'

Report: IoT devices to smash 40 billion barrier by 2020 - 28 Jul 2015 - CRN UK News

Report: IoT devices to smash 40 billion barrier by 2020 - 28 Jul 2015 - CRN UK News: "The number of 'things' connected to the internet will almost treble by 2020 to 38.5 billion, according to analyst Juniper Research."



'via Blog this'

Internet of Things (IoT) Security Market Worth 28.90 Billion USD by 2020 - MarketWatch

Internet of Things (IoT) Security Market Worth 28.90 Billion USD by 2020 - MarketWatch: "Internet of Things (IoT) Security Market is expected to grow from USD 6.89 Billion in 2015 to USD 28.90 Billion by 2020, at a Compound Annual Growth Rate (CAGR) of 33.2% from 2015 to 2020."



'via Blog this'

Risk Mismanagement – Scoring vs. Monte Carlo vs. Scoring | BlogInfoSec.com - Part 2

Debate....

http://www.bloginfosec.com/2011/09/12/risk-mismanagement-%e2%80%93-scoring-vs-monte-carlo-vs-scoring/2/

FBI — Nine People Charged in Largest Known Computer Hacking and Securities Fraud Scheme

Check it out...

https://m.fbi.gov/#https://www.fbi.gov/newyork/press-releases/2015/nine-people-charged-in-largest-known-computer-hacking-and-securities-fraud-scheme

ESET Virtual Appliance Remotely Manages Network Endpoint Security

ESET seeks to reduce the complexity of managing endpoint security on an enterprise network with the ESET Remote Administrator v6, which is now available as a virtual appliance.

http://mobile.eweek.com/security/eset-virtual-appliance-remotely-manages-network-endpoint-security.html

Thursday, August 13, 2015

Why you should use LinkedIn Pulse to self-publish | CIO

Why you should use LinkedIn Pulse to self-publish | CIO: Self-publishing via LinkedIn Pulse — or writing blog posts on LinkedIn that target its vast user base — can help you gain visibility in your industry, make new connections and find new career opportunities.

FTC Charged Mole Detective Sellers with False Advertising Earlier this Year | Federal Trade Commission

FTC Charged Mole Detective Sellers with False Advertising Earlier this Year | Federal Trade Commission: “We haven’t found any scientific evidence that Mole Detective can accurately assess melanoma risk,” said Jessica Rich, Director of the FTC’s Bureau of Consumer Protection. “If you’re concerned that a mole may be cancerous, please see a health professional.”

Home - Mobile Health Summit 2016

Home - Mobile Health Summit 2016: Formulate a strategy to enhance patient communication, expedite diagnosis and improve clinical outcomes.

Email, back from the dead? - Fourth Source

Email, back from the dead? - Fourth Source

http://www.fourthsource.com/email-marketing/email-back-dead-19563

Karl Popper, the enemy of certainty, part 2: the virtue of refutation | Liz Williams | Comment is free | The Guardian

Destructive testing is the only really viable scientific test: we should always aim at refutation, not confirmation, for confirmation is too easy and too weak.

http://www.theguardian.com/commentisfree/belief/2012/sep/17/popper-enemy-uncertainty-virtue-refutation


From My iPhone

Monday, August 10, 2015

Back to school, back to protecting your child’s information | Consumer Information

Consider this...

http://www.consumer.ftc.gov/blog/back-school-back-protecting-your-childs-information?utm_source=govdelivery

SOMAP.org - Security Officers Management and Analysis Project

**** Open Source IT Risk Management

One of the main goals of the Security Officers Management and Analysis Project (SOMAP.org) is to develop and maintain Open Source Information Security Risk Management documentstools and utilities.

http://www.somap.org/

History | SimpleRisk | Enterprise Risk Management Simplified

++++Based entirely on open source technologies and sporting a Mozilla Public License 2.0, a SimpleRisk instance can be stood up in minutes and instantly provides the security professional with the ability to submit risks, plan mitigations, facilitate management reviews, prioritize for project planning, and track regular reviews

http://www.simplerisk.org/history

Saturday, August 8, 2015

ARCHITECT c4000 Clinical Chemistry Analyzer | Abbott Diagnostics

ARCHITECT c4000 Clinical Chemistry Analyzer | Abbott Diagnostics: The ARCHITECT c4000 Clinical Chemistry Analyzer demonstrates that some “big” things—for example, high-quality testing results and rapid STAT turnaround time

Friday, August 7, 2015

Virus Bulletin : Hype heuristics, signatures and the death of AV (again)

Virus Bulletin : Hype heuristics, signatures and the death of AV (again): What I’m not seeing from marketers inside and beyond the anti-malware industry is recognition that customers need to be educated enough to break the soundbite barrier and see through the hype. If we just tell customers that we’re serving TOAST, we may be condemning them to being toast.

Thursday, August 6, 2015

Panicked teen hanged himself after receiving ransomware scam email • The Register

Panicked teen hanged himself after receiving ransomware scam email •
The Register

http://m.theregister.co.uk/2015/01/23/autistic_teen_joseph_edwards_ransomware_scam_suicide_tragedy/

ID theft impact

pdf report...

http://www.idtheftcenter.org/images/surveys_studies/Aftermath2013.pdf

Why Russian Cybercrime Markets Are Thriving - DataBreachToday

The prices for stolen payment card dataand other cybercrime products and services on Russian underground forums continue to fall.


NexLP - Discover your big data

NexLP - Discover your big data

Imagine your data telling the story and automatically detecting the
fact pattern. The NexLP Story Engine technology is uniquely designed
to perform this task.

http://www.nexlp.com/

API Security: 5 Best Practices

API Security: 5 Best Practices

But many developers are failing to write or use APIs with security in
mind, putting users, networks and data at risk.

http://www.channelpartnersonline.com/reports/2015/06/api-security.aspx

Saturday, August 1, 2015

Risk management IRM defintion

Risk management: "IRM defines risk as "The combination of the probability of an event and its consequence. Consequences can range from positive to negative." All organisations have objectives at strategic, tactical and operational levels - anything that makes achieving these objectives uncertain is a risk. As our world becomes increasingly volatile and unpredictable, we must cope with greater uncertainty.

"



'via Blog this'

Security researcher: Globalstar GPS at risk of hackers

Security researcher: Globalstar GPS at risk of hackers

Millions of devices already run on the Globalstar system.

http://www.engadget.com/2015/07/31/security-researcher-globalstar-gps-at-risk-of-hackers/