<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6535114968080307602</atom:id><lastBuildDate>Sat, 05 Oct 2024 02:11:58 +0000</lastBuildDate><category>Kevin Nixon</category><category>data privacy</category><category>Compliance</category><category>Economy: Problems</category><category>Governance</category><category>Risk</category><category>ID Theft</category><category>hackers</category><category>GRC</category><category>scams</category><category>Data Theft</category><category>confidential</category><category>phishing</category><category>Bill Brenner</category><category>CSO Online</category><category>fraudulent email</category><category>Zero Day Attack</category><category>Anderson Cooper</category><category>HIPAA</category><category>Emergency Response Plannng</category><category>Business Continuity</category><category>Kevin M Nixon</category><category>COBRA</category><category>Global Health Emergency</category><category>Pandemic Influenza Planning</category><category>&quot;2009 Stimulus Bill&quot;</category><category>Public Policy</category><category>Cyber-Infrastructure</category><category>Cyber-Space</category><category>2009</category><category>Government</category><category>Icerocket</category><category>(ISC)2</category><category>CGEIT</category><category>CIPP</category><category>CISM</category><category>CISSP</category><category>Data Breaches</category><category>IAPP</category><category>ISACA</category><category>Ponemon Institute</category><category>Privacy</category><category>www.information-security-resources.com</category><category>Mike Spinney</category><title>The Daily Sandbox!</title><description>A friend said to me once &quot;Waves turn rocks to sand. Make Waves!&#xa;&#xa;Following that advice this Blog Site was established for unconventional thinkers. The Wave-Makers. We will discuss issues around IT Security, Corporate Governance, Risk, Regulatory Compliance, Data Privacy and what happens when things go very wrong.</description><link>http://thedailysandbox.blogspot.com/</link><managingEditor>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</managingEditor><generator>Blogger</generator><openSearch:totalResults>60</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-5171073253108424368</guid><pubDate>Sun, 02 Aug 2009 21:11:00 +0000</pubDate><atom:updated>2009-08-02T16:11:46.927-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">(ISC)2</category><category domain="http://www.blogger.com/atom/ns#">2009</category><category domain="http://www.blogger.com/atom/ns#">Business Continuity</category><category domain="http://www.blogger.com/atom/ns#">CGEIT</category><category domain="http://www.blogger.com/atom/ns#">CIPP</category><category domain="http://www.blogger.com/atom/ns#">CISM</category><category domain="http://www.blogger.com/atom/ns#">CISSP</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">confidential</category><category domain="http://www.blogger.com/atom/ns#">CSO Online</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Space</category><category domain="http://www.blogger.com/atom/ns#">Data Breaches</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">fraudulent email</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">Government</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">IAPP</category><category domain="http://www.blogger.com/atom/ns#">Icerocket</category><category domain="http://www.blogger.com/atom/ns#">ID Theft</category><category domain="http://www.blogger.com/atom/ns#">ISACA</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Kevin Nixon</category><category domain="http://www.blogger.com/atom/ns#">Pandemic Influenza Planning</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Ponemon Institute</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">scams</category><category domain="http://www.blogger.com/atom/ns#">www.information-security-resources.com</category><category domain="http://www.blogger.com/atom/ns#">Zero Day Attack</category><title>Internet Security Alliance News &amp;amp; Information Security Resources</title><description>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;&lt;em&gt;&lt;strong&gt;From &lt;a href=&quot;http://www.isalliance.org/&quot;&gt;The Internet Security Alliance &lt;/a&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;    &lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;http://information-security-resources.com/wp-content/uploads/2009/07/internet-300x236.jpg&quot; width=&quot;240&quot; height=&quot;189&quot; /&gt;&lt;strong&gt;&lt;/strong&gt; &lt;/p&gt;    &lt;p&gt;&lt;em&gt;&lt;strong&gt;In The News…&lt;/strong&gt;&lt;/em&gt; &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;July 24, Orange County Register&lt;/strong&gt; – (California) &lt;strong&gt;FBI to investigate Placentia library hacking&lt;/strong&gt;. The FBI is hunting down the hackers that hijacked the Placentia Public Library Web site the morning of July 24, a bureau official said the same afternoon. “The FBI will open and investigation into this incident,” said an FBI spokeswoman. The spokeswoman, who works out of the bureau’s Los Angeles field office, said that the FBI has a special unit that investigates “cyber crimes, computer intrusions, defacements, more traditional crimes like fraud and child exploitation.” Visitors to the Placentia Library Web site were greeted by an image of a flapping flag with a crescent moon and star behind a portrait of famed Turkish leader Mustafa Kemal Ataturk. Underneath was the phrase “Editaarruz is back.” A group calling itself the “Federal Attack Team” has apparently hacked &lt;a href=&quot;http://www.placentialibrary.org/&quot;&gt;www.placentialibrary.org&lt;/a&gt; — disabling the site completely. The word “taarruz” means “attack” or “offensive” in the Turkish language.       &lt;br /&gt;&lt;strong&gt;Source&lt;/strong&gt;: &lt;a href=&quot;http://www.ocregister.com/articles/site-web-search-2506225-google-placentia&quot;&gt;http://www.ocregister.com/articles/site-web-search-2506225-google-placentia&lt;/a&gt;&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;&lt;a href=&quot;http://information-security-resources.com/2009/07/28/internet-security-alliance-news-7-29-09/&quot;&gt;Internet Security Alliance News 7-29-09 : Information Security Resources&lt;/a&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:dc0d8358-500f-4035-bf44-4edb0a876bfb&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/audits&quot; rel=&quot;tag&quot;&gt;audits&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cybersquatting&quot; rel=&quot;tag&quot;&gt;cybersquatting&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/defense+industrial+base&quot; rel=&quot;tag&quot;&gt;defense industrial base&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DIB&quot; rel=&quot;tag&quot;&gt;DIB&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DMCA&quot; rel=&quot;tag&quot;&gt;DMCA&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/docs&quot; rel=&quot;tag&quot;&gt;docs&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Host&quot; rel=&quot;tag&quot;&gt;Host&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ICANN&quot; rel=&quot;tag&quot;&gt;ICANN&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISA&quot; rel=&quot;tag&quot;&gt;ISA&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/lawyer&quot; rel=&quot;tag&quot;&gt;lawyer&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/phishers&quot; rel=&quot;tag&quot;&gt;phishers&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/spammers&quot; rel=&quot;tag&quot;&gt;spammers&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:8ab676a1-7e87-42c4-8f82-4712b522c1e7&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/audits&quot; rel=&quot;tag&quot;&gt;audits&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cybersquatting&quot; rel=&quot;tag&quot;&gt;cybersquatting&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/defense+industrial+base&quot; rel=&quot;tag&quot;&gt;defense industrial base&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DIB&quot; rel=&quot;tag&quot;&gt;DIB&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DMCA&quot; rel=&quot;tag&quot;&gt;DMCA&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/docs&quot; rel=&quot;tag&quot;&gt;docs&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Host&quot; rel=&quot;tag&quot;&gt;Host&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ICANN&quot; rel=&quot;tag&quot;&gt;ICANN&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISA&quot; rel=&quot;tag&quot;&gt;ISA&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/lawyer&quot; rel=&quot;tag&quot;&gt;lawyer&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/phishers&quot; rel=&quot;tag&quot;&gt;phishers&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/spammers&quot; rel=&quot;tag&quot;&gt;spammers&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:1f2bcb24-935d-4915-849b-9dfbc7410155&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=audits&quot; rel=&quot;tag&quot;&gt;audits&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cybersquatting&quot; rel=&quot;tag&quot;&gt;cybersquatting&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=defense+industrial+base&quot; rel=&quot;tag&quot;&gt;defense industrial base&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DIB&quot; rel=&quot;tag&quot;&gt;DIB&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DMCA&quot; rel=&quot;tag&quot;&gt;DMCA&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=docs&quot; rel=&quot;tag&quot;&gt;docs&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Host&quot; rel=&quot;tag&quot;&gt;Host&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ICANN&quot; rel=&quot;tag&quot;&gt;ICANN&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISA&quot; rel=&quot;tag&quot;&gt;ISA&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=lawyer&quot; rel=&quot;tag&quot;&gt;lawyer&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=phishers&quot; rel=&quot;tag&quot;&gt;phishers&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=spammers&quot; rel=&quot;tag&quot;&gt;spammers&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:b8e30ec8-91c7-4563-bac8-bcabfead6db5&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/audits&quot; rel=&quot;tag&quot;&gt;audits&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cybersquatting&quot; rel=&quot;tag&quot;&gt;cybersquatting&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/defense+industrial+base&quot; rel=&quot;tag&quot;&gt;defense industrial base&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DIB&quot; rel=&quot;tag&quot;&gt;DIB&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DMCA&quot; rel=&quot;tag&quot;&gt;DMCA&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/docs&quot; rel=&quot;tag&quot;&gt;docs&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Host&quot; rel=&quot;tag&quot;&gt;Host&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ICANN&quot; rel=&quot;tag&quot;&gt;ICANN&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISA&quot; rel=&quot;tag&quot;&gt;ISA&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/lawyer&quot; rel=&quot;tag&quot;&gt;lawyer&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/phishers&quot; rel=&quot;tag&quot;&gt;phishers&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/spammers&quot; rel=&quot;tag&quot;&gt;spammers&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/08/internet-security-alliance-news.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-2016166299913752399</guid><pubDate>Sun, 02 Aug 2009 17:19:00 +0000</pubDate><atom:updated>2009-08-02T12:19:32.897-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">www.information-security-resources.com</category><title>♪ Smile - Charlie Chaplin</title><description>&lt;p&gt;A special “Thank You” for all my friends and family. - Kev &lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: left; padding-top: 0px&quot; id=&quot;scid:5737277B-5D6D-4f48-ABFC-DD9C333F4C5D:7fecafb2-4366-4d4e-8855-cfa3fb55d6fe&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;&lt;div&gt;&lt;object width=&quot;414&quot; height=&quot;338&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube-nocookie.com/v/iu-rLA4POkI&amp;amp;hl=en&amp;amp;fs=1&amp;amp;color1=0x2b405b&amp;amp;color2=0x6b8ab6&amp;amp;border=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube-nocookie.com/v/iu-rLA4POkI&amp;amp;hl=en&amp;amp;fs=1&amp;amp;color1=0x2b405b&amp;amp;color2=0x6b8ab6&amp;amp;border=1&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;414&quot; height=&quot;338&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;/div&gt; &lt;a href=&quot;http://www.youtube.com/watch?v=iu-rLA4POkI&quot;&gt;YouTube - ♪ Smile - Charlie Chaplin&lt;/a&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:cac47cf4-3339-4c0c-b9c9-15943e12caf2&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/information-security-resources.com&quot; rel=&quot;tag&quot;&gt;information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:4ac813aa-2dab-4cd5-bb0d-566073d725be&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/information-security-resources.com&quot; rel=&quot;tag&quot;&gt;information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:8e9f42ae-c3c8-4c66-ace8-bc278ea91cfc&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=information-security-resources.com&quot; rel=&quot;tag&quot;&gt;information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:9609908a-4c13-428f-8a31-e0422a67461b&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/information-security-resources.com&quot; rel=&quot;tag&quot;&gt;information-security-resources.com&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/08/smile-charlie-chaplin.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-4896011189288315788</guid><pubDate>Fri, 31 Jul 2009 16:41:00 +0000</pubDate><atom:updated>2009-07-31T11:41:30.715-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">(ISC)2</category><category domain="http://www.blogger.com/atom/ns#">CGEIT</category><category domain="http://www.blogger.com/atom/ns#">CIPP</category><category domain="http://www.blogger.com/atom/ns#">CISM</category><category domain="http://www.blogger.com/atom/ns#">CISSP</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">Data Breaches</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">IAPP</category><category domain="http://www.blogger.com/atom/ns#">ISACA</category><category domain="http://www.blogger.com/atom/ns#">Mike Spinney</category><category domain="http://www.blogger.com/atom/ns#">Ponemon Institute</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><title>The Value of a Clear Moral Compass</title><description>&lt;p&gt;By:&amp;#160; &lt;a href=&quot;http://www.ponemon.org/management&quot; target=&quot;_blank&quot;&gt;Mike Spinney, CIPP&lt;/a&gt; –&amp;#160; Privacy Analyst, Ponemon Institute&lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;justify&quot;&gt;Here’s a brazen bit of breachery from the &lt;em&gt;&lt;a href=&quot;http://www.miamiherald.com/news/breaking-news/story/1164940.html&quot;&gt;Miami Herald&lt;/a&gt;&lt;/em&gt;. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;It’s a neat little proposition: for a flat monthly fee, a data broker (of sorts) acquires medical records from a hospital employee and passes them through to a personal injury lawyer for a fee plus a percentage of his lawsuit earnings. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Apparently the scheme went on for two years before the hospital employee blabbed about it. Luckily for Miami-area residents, someone with a clearer moral compass recognized the crime and told authorities. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;This isn’t all that different from the revelation that UCLA Medical Center employees were abusing their access privileges to snoop the files of celebrity patients, either for their own amusement or to pass info along to the tabloids. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;While both stories are a reminder of the serious threat posed by malicious insiders, the Jackson Memorial case offers another lesson: don’t overlook the importance of personal ethics in your security strategy. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;We have no information about the security and ID/access management technologies in place at Jackson Memorial, and we don’t know if the person who tipped the police was a co-worker. But we do know that someone who knew right from wrong had the moral courage to do the right thing when confronted with information related to misconduct. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Good, consistent training and an ongoing awareness campaign – along with a visible example set from the top down –&amp;#160; can have a positive effect on your company’s overall security program (and at a very reasonable cost). We cannot emphasize enough the importance of creating a security-conscious culture within every organization. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;http://www.ponemon.org/management&quot; target=&quot;_blank&quot;&gt;Mike Spinney, Senior Privacy Analyst , CIPP&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt; &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Mike Spinney is a senior privacy analyst with the &lt;a href=&quot;http://www.ponemon.org/index.php&quot; target=&quot;_blank&quot;&gt;Ponemon Institute&lt;/a&gt;, a research organization dedicated to advancing responsible information and privacy management practices in business and government. He works closely with founder Dr. Larry Ponemon to develop a better understanding of and new approaches to responsible information management.&amp;#160; Spinney serves on the Ponemon Institute’s &lt;a href=&quot;http://www.ponemon.org/rim-council&quot; target=&quot;_blank&quot;&gt;RIM Council&lt;/a&gt; and is a frequent author and speaker on data privacy issues.       &lt;br /&gt;      &lt;br /&gt;Spinney’s work on privacy has appeared in &lt;a href=&quot;https://www.privacyassociation.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=12&amp;amp;Itemid=224&quot; target=&quot;_blank&quot;&gt;Privacy Advisor&lt;/a&gt;, &lt;a href=&quot;https://www.privacyassociation.org/index.php&quot; target=&quot;_blank&quot;&gt;1to1: Privacy&lt;/a&gt;, &lt;a href=&quot;http://www.rfidjournal.com/&quot; target=&quot;_blank&quot;&gt;RFID Journal&lt;/a&gt;, &lt;a href=&quot;http://www.csoonline.com/&quot; target=&quot;_blank&quot;&gt;CSO&lt;/a&gt;, &lt;a href=&quot;http://www.computerworld.com/&quot; target=&quot;_blank&quot;&gt;Computerworld&lt;/a&gt;, and other industry publications, and he has addressed audiences including the Privacy Summit, Secure Boston, Secure Chicago, IAPP/ISC(2) Security Series, INTERPHEX, and SecureWorld. He is a frequent media resource on privacy issues and has been quoted extensively by such media as the San Francisco Chronicle, &lt;a href=&quot;http://news.bbc.co.uk/2/hi/technology/default.stm&quot; target=&quot;_blank&quot;&gt;BBC, Inc. Technology&lt;/a&gt;, &lt;a href=&quot;http://www.popsci.com/&quot; target=&quot;_blank&quot;&gt;Popular Science&lt;/a&gt;, &lt;a href=&quot;http://www.ama-assn.org/amednews/&quot; target=&quot;_blank&quot;&gt;American Medical News&lt;/a&gt;, &lt;a href=&quot;http://www.securitymanagement.com/&quot; target=&quot;_blank&quot;&gt;Security Management&lt;/a&gt;, &lt;a href=&quot;http://www.idg.com/www/HomeNew.nsf/docs/News_Service_Intro&quot; target=&quot;_blank&quot;&gt;IDG News Service&lt;/a&gt;, &lt;a href=&quot;http://www.scmagazine.com/&quot; target=&quot;_blank&quot;&gt;SC Magazine&lt;/a&gt;, and many more. &lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;&lt;a title=&quot;The Value of a Clear Moral Compass - Mike Spinney&amp;#39;s Blog&quot; href=&quot;http://www.ponemon.org/blog/post/the-value-of-a-clear-moral-compass&quot;&gt;The Value of a Clear Moral Compass - Mike Spinney&#39;s Blog&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;   &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:d231655f-638f-4ae3-b81c-79dbc4c3e63f&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/birth+certificate&quot; rel=&quot;tag&quot;&gt;birth certificate&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Mike+Spinney&quot; rel=&quot;tag&quot;&gt;Mike Spinney&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Ponemon+Institute&quot; rel=&quot;tag&quot;&gt;Ponemon Institute&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Larry+Ponemon&quot; rel=&quot;tag&quot;&gt;Larry Ponemon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/child+identity+theft&quot; rel=&quot;tag&quot;&gt;child identity theft&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/embezzlement&quot; rel=&quot;tag&quot;&gt;embezzlement&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/FBI&quot; rel=&quot;tag&quot;&gt;FBI&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/fraud&quot; rel=&quot;tag&quot;&gt;fraud&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Identity+Theft+Resoiurce+Center&quot; rel=&quot;tag&quot;&gt;Identity Theft Resoiurce Center&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/IDExperts&quot; rel=&quot;tag&quot;&gt;IDExperts&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ITRC&quot; rel=&quot;tag&quot;&gt;ITRC&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/model+employee&quot; rel=&quot;tag&quot;&gt;model employee&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/online+fraud&quot; rel=&quot;tag&quot;&gt;online fraud&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/red+flags&quot; rel=&quot;tag&quot;&gt;red flags&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/scams&quot; rel=&quot;tag&quot;&gt;scams&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/stealing+data&quot; rel=&quot;tag&quot;&gt;stealing data&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/students&quot; rel=&quot;tag&quot;&gt;students&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Transunion&quot; rel=&quot;tag&quot;&gt;Transunion&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;    &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:212378ea-8269-43b2-b257-d7c81b5df9d3&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/birth+certificate&quot; rel=&quot;tag&quot;&gt;birth certificate&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Mike+Spinney&quot; rel=&quot;tag&quot;&gt;Mike Spinney&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Ponemon+Institute&quot; rel=&quot;tag&quot;&gt;Ponemon Institute&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Larry+Ponemon&quot; rel=&quot;tag&quot;&gt;Larry Ponemon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/child+identity+theft&quot; rel=&quot;tag&quot;&gt;child identity theft&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/embezzlement&quot; rel=&quot;tag&quot;&gt;embezzlement&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/FBI&quot; rel=&quot;tag&quot;&gt;FBI&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/fraud&quot; rel=&quot;tag&quot;&gt;fraud&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Identity+Theft+Resoiurce+Center&quot; rel=&quot;tag&quot;&gt;Identity Theft Resoiurce Center&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/IDExperts&quot; rel=&quot;tag&quot;&gt;IDExperts&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ITRC&quot; rel=&quot;tag&quot;&gt;ITRC&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/model+employee&quot; rel=&quot;tag&quot;&gt;model employee&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/online+fraud&quot; rel=&quot;tag&quot;&gt;online fraud&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/red+flags&quot; rel=&quot;tag&quot;&gt;red flags&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/scams&quot; rel=&quot;tag&quot;&gt;scams&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/stealing+data&quot; rel=&quot;tag&quot;&gt;stealing data&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/students&quot; rel=&quot;tag&quot;&gt;students&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Transunion&quot; rel=&quot;tag&quot;&gt;Transunion&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;    &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:05d95d6d-3df2-4863-b0fa-3458e2a7a31e&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=birth+certificate&quot; rel=&quot;tag&quot;&gt;birth certificate&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Mike+Spinney&quot; rel=&quot;tag&quot;&gt;Mike Spinney&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Ponemon+Institute&quot; rel=&quot;tag&quot;&gt;Ponemon Institute&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Larry+Ponemon&quot; rel=&quot;tag&quot;&gt;Larry Ponemon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=child+identity+theft&quot; rel=&quot;tag&quot;&gt;child identity theft&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=embezzlement&quot; rel=&quot;tag&quot;&gt;embezzlement&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=FBI&quot; rel=&quot;tag&quot;&gt;FBI&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=fraud&quot; rel=&quot;tag&quot;&gt;fraud&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Identity+Theft+Resoiurce+Center&quot; rel=&quot;tag&quot;&gt;Identity Theft Resoiurce Center&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=IDExperts&quot; rel=&quot;tag&quot;&gt;IDExperts&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ITRC&quot; rel=&quot;tag&quot;&gt;ITRC&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=model+employee&quot; rel=&quot;tag&quot;&gt;model employee&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=online+fraud&quot; rel=&quot;tag&quot;&gt;online fraud&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=red+flags&quot; rel=&quot;tag&quot;&gt;red flags&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=scams&quot; rel=&quot;tag&quot;&gt;scams&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=stealing+data&quot; rel=&quot;tag&quot;&gt;stealing data&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=students&quot; rel=&quot;tag&quot;&gt;students&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Transunion&quot; rel=&quot;tag&quot;&gt;Transunion&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;    &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:c71b91f1-2391-4cc4-8a87-495b8f03c452&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/birth+certificate&quot; rel=&quot;tag&quot;&gt;birth certificate&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Mike+Spinney&quot; rel=&quot;tag&quot;&gt;Mike Spinney&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Ponemon+Institute&quot; rel=&quot;tag&quot;&gt;Ponemon Institute&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Larry+Ponemon&quot; rel=&quot;tag&quot;&gt;Larry Ponemon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/child+identity+theft&quot; rel=&quot;tag&quot;&gt;child identity theft&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/embezzlement&quot; rel=&quot;tag&quot;&gt;embezzlement&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/FBI&quot; rel=&quot;tag&quot;&gt;FBI&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/fraud&quot; rel=&quot;tag&quot;&gt;fraud&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Identity+Theft+Resoiurce+Center&quot; rel=&quot;tag&quot;&gt;Identity Theft Resoiurce Center&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/IDExperts&quot; rel=&quot;tag&quot;&gt;IDExperts&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ITRC&quot; rel=&quot;tag&quot;&gt;ITRC&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/model+employee&quot; rel=&quot;tag&quot;&gt;model employee&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/online+fraud&quot; rel=&quot;tag&quot;&gt;online fraud&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/red+flags&quot; rel=&quot;tag&quot;&gt;red flags&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/scams&quot; rel=&quot;tag&quot;&gt;scams&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/stealing+data&quot; rel=&quot;tag&quot;&gt;stealing data&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/students&quot; rel=&quot;tag&quot;&gt;students&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Transunion&quot; rel=&quot;tag&quot;&gt;Transunion&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt; &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://www.ponemon.org/blog/post/the-value-of-a-clear-moral-compass&quot;&gt;The Value of a Clear Moral Compass - Mike Spinney&#39;s Blog&lt;/a&gt;&lt;/p&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/07/value-of-clear-moral-compass.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-4010434673638836544</guid><pubDate>Tue, 28 Jul 2009 16:12:00 +0000</pubDate><atom:updated>2009-07-28T11:12:48.602-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2009</category><category domain="http://www.blogger.com/atom/ns#">Business Continuity</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Space</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">Government</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">Icerocket</category><category domain="http://www.blogger.com/atom/ns#">ID Theft</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Kevin Nixon</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">scams</category><category domain="http://www.blogger.com/atom/ns#">Zero Day Attack</category><title>Securing a Hacker-Free Zone on the Internet</title><description>&lt;p align=&quot;justify&quot;&gt;&lt;em&gt;&amp;#160;&lt;/em&gt;&lt;a href=&quot;http://lh4.ggpht.com/_9STd2plIvHE/Sm8jd4btMNI/AAAAAAAAAGg/L0u8J8XIs5c/s1600-h/Jackie%20Herships%5B13%5D.jpg&quot;&gt;&lt;img style=&quot;border-right-width: 0px; margin: 0px 10px 10px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;Jackie Herships&quot; border=&quot;0&quot; alt=&quot;Jackie Herships&quot; align=&quot;left&quot; src=&quot;http://lh3.ggpht.com/_9STd2plIvHE/Sm8jeUue49I/AAAAAAAAAGk/MgJOQ62bFhI/Jackie%20Herships_thumb%5B11%5D.jpg?imgmax=800&quot; width=&quot;82&quot; height=&quot;85&quot; /&gt;&lt;/a&gt;&lt;em&gt;&lt;em&gt;        &lt;br /&gt;&lt;/em&gt;By &lt;a href=&quot;http://www.linkedin.com/in/jacquelineherships&quot; target=&quot;_blank&quot;&gt;&lt;font color=&quot;#ffff00&quot;&gt;Jacqueline Herships&lt;/font&gt;&lt;/a&gt;, Founder of Jacqueline Herships &amp;amp; Associates       &lt;br /&gt;&lt;font size=&quot;1&quot;&gt;(This article was first published in the Gerard Group International, Inc. newsletter “&lt;/font&gt;&lt;a href=&quot;http://gerardgroup.com/newsletter/nl2008-11-11.php&quot;&gt;&lt;font size=&quot;1&quot;&gt;INTEL&lt;i&gt;ANALYSIS&lt;/i&gt;&lt;/font&gt;&lt;/a&gt;&lt;font size=&quot;1&quot;&gt;”.)&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;em&gt;&lt;a href=&quot;http://lh4.ggpht.com/_9STd2plIvHE/Sm8jd4btMNI/AAAAAAAAAGg/L0u8J8XIs5c/s1600-h/Jackie%20Herships%5B13%5D.jpg&quot; rel=&quot;WLPP&quot;&gt;&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; &lt;font color=&quot;#0080ff&quot;&gt;&lt;em&gt;&lt;u&gt;       &lt;p align=&quot;justify&quot;&gt;         &lt;br /&gt;&lt;font size=&quot;2&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;&lt;strong&gt;Patented Telecommunications Plan Would Create Secure VoIP Communications&lt;/strong&gt;&lt;/font&gt;            &lt;br /&gt;            &lt;br /&gt;&lt;/font&gt;&lt;/p&gt;     &lt;/u&gt;&lt;/em&gt;A recent patent series promises a new, secure telecommunications system by mitigating risks to Internet telephony like &lt;a href=&quot;http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol&quot; target=&quot;_blank&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Voice over Internet Protocol (VoIP)&lt;/font&gt;&lt;/a&gt; from espionage, hacking, intrusion, and interruption of service. &lt;/font&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;a href=&quot;http://lh6.ggpht.com/_9STd2plIvHE/Sm8IXh-kImI/AAAAAAAAAGo/MgdNcCPVmQk/s1600-h/computer-hacking%5B2%5D.jpg&quot;&gt;&lt;img style=&quot;border-right-width: 0px; margin: 0px 10px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;computer-hacking&quot; border=&quot;0&quot; alt=&quot;computer-hacking&quot; align=&quot;left&quot; src=&quot;http://lh5.ggpht.com/_9STd2plIvHE/Sm8IX0QG5xI/AAAAAAAAAGs/LxJum-kanbc/computer-hacking_thumb%5B2%5D.jpg?imgmax=800&quot; width=&quot;131&quot; height=&quot;148&quot; /&gt;&lt;/a&gt;The entire worldwide &lt;a href=&quot;http://en.wikipedia.org/wiki/Domain_Name_System&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Domain Name System (DNS)&lt;/font&gt;&lt;/a&gt; was brought to its knees by hackers not too long ago; however, this new Internet telecommunications system will not depend on DNS.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;In theory at least, the Wild West days of Internet telecommunications are over. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Based upon the inventions articulated in his five-patent suite, inventor &lt;a href=&quot;http://www.linkedin.com/in/harryemerson&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Harry Emerson III&lt;/font&gt;&lt;/a&gt;, has mapped out a union between our secure and venerable telephone system - (&lt;a href=&quot;http://en.wikipedia.org/wiki/Plain_old_telephone_service&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Plain Old Telephone Service; a.k.a., POTS&lt;/font&gt;&lt;/a&gt;) - and the hyper-evolving, media-rich Internet which is so famously not one bit secure.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;As it evolves, he believes this next generation telecommunications system, dubbed &lt;a href=&quot;http://voipsa.org/pipermail/voipsec_voipsa.org/2009-January/002853.html&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;IronPipe™&lt;/font&gt;&lt;/a&gt;, will have huge implications for national security as well as tremendous new revenue opportunities for the carriers and supply chains which serve them.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Conceived in response to what he views as the seriously flawed paradigm, which is currently developing as telecommunications migrates to the Internet, Mr. Emerson says he designed IronPipe™ to offer an alternative with a high degree of security.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;The Internet has produced something akin to a gold rush experience for those mining its resources and developing its vast potentialities, he said. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;However, in the midst of this frenzy, he has observed that fundamental requirements of privacy, secrecy, and security are seldom openly discussed when it comes to Internet-based phone services known as Voice over Internet Protocol (VoIP) systems such as Skype, which are proliferating in cyberspace. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;These are serious issues, he maintains, and they need to be fully considered by users such as corporations, telecommunications carriers, VoIP carriers, law enforcement agencies, and federal and state governments, as well as by the millions of Internet using individuals who are concerned with their own personal privacy.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;According to Mr. Emerson, our current state of vulnerability came about because we have turned a blind eye to these issues of privacy, secrecy and security, combined with the scramble for profit, and an unregulated environment for VoIP. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;em&gt;“The Internet is a lawless frontier where nothing is safe and secure and reliability is always one step away from calamity,”&lt;/em&gt; he says.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;em&gt;“As things stand today, VoIP does little to protect the interests of the aforementioned entities, not to mention protecting the security of the United States. We are suffering untold numbers of hacker attacks DAILY, with systems broken into and identities stolen. Not too long ago the entire worldwide DNS system (Domain Name System) was brought to its knees by hackers,”&lt;/em&gt; Emerson said. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;In his opinion, if the technology continues to develop in its current direction, no one will be able to guarantee that communications cannot be intercepted and monitored. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;In addition, if we examine our circumstances, a lot of the excitement generating the rush to VoIP is based upon an illusion, the appearance that we are being offered new and sophisticated technologies. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;In fact, existing VoIP offerings are simply discounted POTS service, he says, with no value-added features, only lower cost caused by fierce price pressure from cable TV and other low-overhead vendors.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;The result is the continued downward spiral on price that has plagued the telecommunications industry for 30 years. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;IronPipe™ is a re-thinking of 21&lt;sup&gt;st&lt;/sup&gt; century telecommunications architecture, which will return a sense of safety to our society as a whole, reinvigorating our economy from the inside out. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;If his vision is implemented, Mr. Emerson says we won’t have to put up with either the fear of intrusion or the huge financial burden of protecting ourselves from the ever-increasing army of those with malicious intent.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;We will now have a choice.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;The challenge is that VoIP companies such as &lt;a href=&quot;http://about.skype.com/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Skype (NASDAQ: EBAY),&lt;/font&gt;&lt;/a&gt;&lt;font color=&quot;#ecc904&quot;&gt; &lt;/font&gt;&lt;a href=&quot;http://www.vonage.com/corporate/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Vonage (NYSE: VG)&lt;/font&gt;&lt;/a&gt; and the various Cable carriers (&lt;a href=&quot;http://www.comcast.com/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Comcast NASDAQ: CMCSA&lt;/font&gt;&lt;/a&gt;&lt;font color=&quot;#ecc904&quot;&gt;, &lt;/font&gt;&lt;a href=&quot;http://www.timewarner.com/corp/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Time Warner: NYSE TMC&lt;/font&gt;&lt;/a&gt;&lt;font color=&quot;#ecc904&quot;&gt;, and &lt;/font&gt;&lt;a href=&quot;http://www.cablevision.com/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;CableVision: NYSE CVC&lt;/font&gt;&lt;/a&gt;) , which have migrated to the Internet, did so not only to provide cheaper communications, but to avoid regulatory scrutiny.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;em&gt;“If you don’t have to deal with the regulations it tends to make it cheaper,” &lt;/em&gt;Emerson said, “&lt;em&gt;but these profits come at a price.”&lt;/em&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;em&gt;“The integrity of the communications system has been compromised because of this short term thinking geared towards reducing costs.”&lt;/em&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;In its simplest terms, IronPipe™ enables us to make &lt;a href=&quot;http://en.wikipedia.org/wiki/Web_2.0&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Web 2.0 Internet&lt;/font&gt;&lt;/a&gt;-style media rich calls utilizing the existing private, protected, secure, &lt;a href=&quot;http://en.wikipedia.org/wiki/Public_switched_telephone_network&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Public Switched Telephone Network (PSTN)&lt;/font&gt;&lt;/a&gt;, and its unseen private data network - known as &lt;a href=&quot;http://en.wikipedia.org/wiki/Signaling_System_7&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Signaling System #7 (SS7)&lt;/font&gt;&lt;/a&gt;, which connects all the main switches around the world. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;While VoIP uses the Internet exclusively and thus can be, and regularly is, compromised by persons of malicious intent, if we establish Internet calls through these telephone company switches there will be no access from the outside.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;We can create rich media visual telephone calls on broadband Internet connections, using wire-line or wireless touch-screen phones such as the Apple &lt;a href=&quot;http://www.apple.com/about/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;(NASDAQ: AAPL)&lt;/font&gt;&lt;/a&gt; iPhone, simply by dialing a phone number, and still enjoy the privacy, security and reliability of traditional telephone calls. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Mr. Emerson says that his technology seamlessly merges the best of the Internet with the best of the telephone network.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Considering the cost to government, industry and “society at large” to protect against intrusion and to remediate the damage caused by intrusion, IronPipe™ could be well worth looking into.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;About Harry Emerson, Co-Founder Emerson Development LLC:&lt;/strong&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;&amp;#160; Mr. Harry Emerson&lt;/strong&gt; is an expert in computers, voice and data communications, and the Internet. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;a href=&quot;http://lh4.ggpht.com/_9STd2plIvHE/Sm8jfLHMz5I/AAAAAAAAAG0/d8I6IoVWtqg/s1600-h/Harry%20Emerson%5B14%5D.jpg&quot;&gt;&lt;img style=&quot;border-right-width: 0px; margin: 5px 10px 20px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;Harry Emerson&quot; border=&quot;0&quot; alt=&quot;Harry Emerson&quot; align=&quot;left&quot; src=&quot;http://lh4.ggpht.com/_9STd2plIvHE/Sm8jfvAW3pI/AAAAAAAAAG8/-3_PTmpZypY/Harry%20Emerson_thumb%5B10%5D.jpg?imgmax=800&quot; width=&quot;79&quot; height=&quot;103&quot; /&gt;&lt;/a&gt;His career history includes 25 years in various sales, management, and strategic capacities at &lt;a href=&quot;http://www.att.com/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;AT&amp;amp;T (NYSE: T)&lt;/font&gt;&lt;/a&gt; and the design and management of large-scale, multi-million dollar enterprise applications and data systems. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;He has numerous patents issued and pending against a variety of technologies including FM radio, Internet streaming, PC software, and telecommunications. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Mr. Emerson co-founded GEODE Electronics to commercialize a series of patented enhancements to commercial FM radio. Subsequently, Mr. Emerson co-founded &lt;a href=&quot;http://www.surfernetwork.com/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;SurferNETWORK&lt;/font&gt;&lt;/a&gt;, an Internet streaming media business. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;His background in switching systems and data networking, along with concepts he developed in corporate architecture and strategy positions, ultimately led to the development of the patent portfolio that defines the next generation of secure telecommunications, known as IronPipe™, featuring secure, rich Multimedia capabilities. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;He is a member of the New Jersey Technology Council &lt;font color=&quot;#ecc904&quot;&gt;(&lt;/font&gt;&lt;a href=&quot;http://www.njtc.org/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;http://www.njtc.org/&lt;/font&gt;&lt;/a&gt;&lt;font color=&quot;#ecc904&quot;&gt;)&lt;/font&gt; Telecommunications/Media Industry Network Advisory board.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.emersondevelopmentllc.com/html/contact_about.htm&quot;&gt;&lt;strong&gt;&lt;font color=&quot;#ecc904&quot;&gt;Emerson Development, LLC&lt;/font&gt;&lt;/strong&gt;&lt;/a&gt; has been awarded a fifth telecommunications patent that introduces breakthrough technology combining the multimedia capability of the Internet with the safety, security, and reliability of the phone network. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;This exciting new technology enables a world in which audio/visual phone calls will become the standard for routine, daily communications. The Emerson Development Multimedia Telecommunications technologies will create the next generation of telecommunications — visual, multimedia, and videophone communications on screen-based phones that require no knowledge or training for users. Just dial a phone number.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Emerson Development Multimedia Telecommunications provides the carrier class infrastructure, operations, management, and billing capabilities that will be absolutely necessary for the major telecommunications companies throughout the world to venture into this field. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;These mandatory capabilities include requirements for security, privacy, secrecy of communications, and unlisted numbers, including the guaranteed ability to keep the identities of callers secret under every circumstance imaginable. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;In addition, just as importantly, Multimedia Telecommunications provides for these privacy and security requirements while still enabling government mandated provisions for law enforcement wiretapping and call tracing.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;u&gt;&lt;em&gt;Overview of the Emerson Development, LLC Patents&lt;/em&gt;&lt;/u&gt; &lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;   &lt;table border=&quot;1&quot; cellspacing=&quot;1&quot; cellpadding=&quot;3&quot; width=&quot;418&quot;&gt;&lt;tbody&gt;       &lt;tr&gt;         &lt;td width=&quot;152&quot; align=&quot;center&quot;&gt;&lt;strong&gt;Patent Number&lt;/strong&gt;&lt;/td&gt;          &lt;td width=&quot;261&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;center&quot;&gt;&lt;strong&gt;               &lt;br /&gt;Description&lt;/strong&gt;&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td width=&quot;152&quot;&gt;           &lt;p align=&quot;center&quot;&gt;&lt;strong&gt;6,704,305&lt;/strong&gt;&lt;/p&gt;         &lt;/td&gt;          &lt;td width=&quot;261&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;“Integrated Device For Integrating The Internet With The Public Switched Telephone Network”                &lt;br /&gt;&lt;/strong&gt;              &lt;br /&gt;This patent, describes telephone devices such as screen phones that support audible and visual communications across the Internet simply by dialing a telephone number. These “Integrated” phones have both a telephone connection and an Internet connection. By using digital call control messages that are sent to and from the local telephone central office, an “Integrated” telephone can set up an Internet Multimedia call to a compatible phone. If the called phone is not Internet capable, a standard phone call is established.&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td width=&quot;152&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;center&quot;&gt;&lt;strong&gt;6,700,884&lt;/strong&gt;&lt;/p&gt;         &lt;/td&gt;          &lt;td width=&quot;261&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;“Integrating the Internet With The Public Switched Telephone Network”                &lt;br /&gt;&lt;/strong&gt;              &lt;br /&gt;This patent, describes a system for a telephone device as described in 6,704,305 to be able to create an Internet call. The system includes a mechanism for correlating the telephone number of a calling or called device with its associated IP address. That information could be stored in the telephone itself, in a record system of the local central office, or in one or more central registries.&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td width=&quot;152&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;center&quot;&gt;&lt;strong&gt;6,697,357&lt;/strong&gt;&lt;/p&gt;         &lt;/td&gt;          &lt;td width=&quot;261&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;“Call Management Managing System For Integrating The Internet With The Public Switched Telephone Network”                &lt;br /&gt;&lt;/strong&gt;              &lt;br /&gt;This patent describes a digital call management messaging system, that could be thought of as an extension of ISDN and SS7, that enables an “Integrated” telephone device to communicate across the Internet. When one of these telephones places a call, it sends a digital message to its serving central office switching system. That message includes its telephone number and IP address, as well as the telephone number of the called party. By sending a compatible message to the central office serving the called party, the originating central office can determine if the called party is capable of an Internet call. If so, once the called device receives the call setup message, it has the Internet IP address of the calling device, and can then establish a connection across the Internet.&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td width=&quot;152&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;center&quot;&gt;&lt;strong&gt;6,928,070&lt;/strong&gt;&lt;/p&gt;         &lt;/td&gt;          &lt;td width=&quot;261&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;“Integrating The Internet With The Public Switched Telephone Network”&lt;/strong&gt;               &lt;br /&gt;              &lt;br /&gt;This patent, describes a sophisticated system, which greatly enhances the privacy, secrecy, and security of Internet calls. This system enables the telephone-switching network to dynamically assign an IP address to both the calling and called device, and route the resulting Internet call through an intermediate proxy server. Internet phones require more than just “unlisted number” capability since a called party can easily determine the geographic location of a caller, and thus putting the life of some individuals at risk (such as a battered spouse). With this invention, the proxy servers can be in other geographic regions to cloak a device’s actual geographic location. Furthermore, the Internet call can be split into two unidirectional streams, and each of those streams can be routed through a separate pair of proxy servers. Since the proxy servers can be dynamically selected for each call, the true location of an “Integrated” phone can be protected.&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;        &lt;tr&gt;         &lt;td width=&quot;152&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;center&quot;&gt;&lt;strong&gt;7,327,720&lt;/strong&gt;&lt;/p&gt;         &lt;/td&gt;          &lt;td width=&quot;261&quot; align=&quot;center&quot;&gt;           &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;“Integrated Telephone Central Office Systems For Integrating The Internet With the Public Switched Telephone Network”                &lt;br /&gt;&lt;/strong&gt;              &lt;br /&gt;This patent describes a telephone central office switching system having a digital messaging capability to send and receive call setup and management messages to and from compatible phones. These call management messages can initiate and control a communications session transpiring across the Internet. The central office switching system can communicate similar digital messages to other central offices and central office systems to create and manage end-to-end Internet communications.&lt;/p&gt;         &lt;/td&gt;       &lt;/tr&gt;     &lt;/tbody&gt;&lt;/table&gt; &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;Emerson Development, LLC’s IronPipe™ Benefits&lt;/strong&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Telephone carriers stand to benefit from this new technology because it preserves their business position by providing high value in the PSTN and in the underlying private SS7 network that connects the PSTN together.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Traditional telephone carriers, as well as VoIP vendors that participate in this new technology, will benefit by offering new high value consumer services instead of competing by cutting prices.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Consumers will benefit from a flourish of new Multimedia features. The experience will be similar to accessing a web page with a browser, but would be done by dialing a phone number.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Industry and governments will benefit from a rich communications environment that is secure from espionage, hacking, intrusion, and interruption.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Questions and comments for Mr. Emerson may be directed to:    &lt;br /&gt;Direct - (973) 641-7420&amp;#160; &lt;br /&gt;Email - &lt;a href=&quot;mailto:hemerson@EmersonDevelopmentLLC.com &quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;hemerson@EmersonDevelopmentLLC.com&lt;/font&gt; &lt;/a&gt;    &lt;br /&gt;Via LinkedIn: &lt;a href=&quot;http://www.linkedin.com/in/harryemerson&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;http://www.linkedin.com/in/harryemerson&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;em&gt;&lt;a href=&quot;http://www.linkedin.com/in/jacquelineherships&quot; target=&quot;_blank&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Jacqueline Herships&lt;/font&gt;&lt;/a&gt; is the founder of Jacqueline Herships &amp;amp; Associates, a strategic communications and new business development company. Jacqueline developed her skills in the documentary film business, as a journalist, and as an organizer in her own right. She believes in the power of alliances and builds these into her strategic plans. In addition to her work with Emerson Development, Ms Herships’ client projects have included the &lt;a href=&quot;http://www.usgbcnj.org/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;US Green Building Council of New Jersey&lt;/font&gt;&lt;/a&gt;, the &lt;a href=&quot;http://www.nyc.sierraclub.org/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Sierra Club - NYC&lt;/font&gt;&lt;/a&gt;, the &lt;a href=&quot;http://www.lisc.org/greaternewark-jerseycity/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;Local Initiatives Support Corporation Greater Newark &amp;amp; Jersey City&lt;/font&gt;&lt;/a&gt; (a funding agency for inner city community development), &lt;a href=&quot;http://www.handsinc.org/&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;HANDS, Inc&lt;/font&gt;&lt;/a&gt;; Wildlight Productions, a critically acclaimed social issues documentary film company; and a variety of artists and arts projects. She is a workshop facilitator for the Support Center for Nonprofit Management in Manhattan and others on the subject of laser communications-developing attention in the age of information overload; she has twice been a member of the board of the International Furnishings and Design Association, IFDA/NY as well as their publicist for 2 years. And, she is the co-founder of Professionals in Media (PIM), a regional organization of media professional including writers, editors, publishers, filmmakers, consultants, etc., who meet across professional lines.&lt;/em&gt;&lt;/p&gt;  &lt;p&gt;&lt;em&gt;Comments and questions may be directed to: Jacqueline Herships &amp;amp; Associates:&amp;#160; &lt;br /&gt;Direct - (973) 763-7555       &lt;br /&gt;&lt;/em&gt;&lt;em&gt;Email - &lt;a href=&quot;mailto:jacqueline@jacquelineherships.com&quot;&gt;&lt;font color=&quot;#ecc904&quot;&gt;jacqueline@jacquelineherships.com&lt;/font&gt;&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;justify&quot;&gt;The Publisher gives permission to link, post, distribute, or reference this article for any lawful purpose, provided attribution is made to the author and to &lt;a href=&quot;http://information-security-resources.com/2009/07/24/internet-security-alliance-news-7-24-09/Information-Security-Resources.com&quot;&gt;Information-Security-Resources.com&lt;/a&gt;&lt;/p&gt; &lt;/blockquote&gt;  &lt;p align=&quot;center&quot;&gt;© Copyright 2009 – Jacqueline Herships – All Rights Reserved&amp;#160;&amp;#160; &lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;    &lt;br /&gt;(This article may be reprinted in whole or in part only with proper attribution to the author.&amp;#160; &lt;a href=&quot;http://www.information-security-resources.com/kevin-m-nixon&quot;&gt;See: Information Security Resources&lt;/a&gt;)&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:93679b2b-8de6-4d17-9603-689e73945afe&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/CableVision&quot; rel=&quot;tag&quot;&gt;CableVision&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/class+action&quot; rel=&quot;tag&quot;&gt;class action&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Comcast&quot; rel=&quot;tag&quot;&gt;Comcast&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DNS&quot; rel=&quot;tag&quot;&gt;DNS&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DOD&quot; rel=&quot;tag&quot;&gt;DOD&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Domain+Name+System&quot; rel=&quot;tag&quot;&gt;Domain Name System&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Emerson+Development+LLC&quot; rel=&quot;tag&quot;&gt;Emerson Development LLC&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/espionage&quot; rel=&quot;tag&quot;&gt;espionage&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/hacking&quot; rel=&quot;tag&quot;&gt;hacking&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Harry+Emerson+III&quot; rel=&quot;tag&quot;&gt;Harry Emerson III&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infiltrate&quot; rel=&quot;tag&quot;&gt;infiltrate&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/interview&quot; rel=&quot;tag&quot;&gt;interview&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/intrusion&quot; rel=&quot;tag&quot;&gt;intrusion&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/iphone&quot; rel=&quot;tag&quot;&gt;iphone&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/IronPipe&quot; rel=&quot;tag&quot;&gt;IronPipe&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Jacqueline+Herships&quot; rel=&quot;tag&quot;&gt;Jacqueline Herships&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Managed+Security&quot; rel=&quot;tag&quot;&gt;Managed Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/markets&quot; rel=&quot;tag&quot;&gt;markets&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/meltdown&quot; rel=&quot;tag&quot;&gt;meltdown&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/paperless&quot; rel=&quot;tag&quot;&gt;paperless&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/POTS&quot; rel=&quot;tag&quot;&gt;POTS&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Public+Switched+Telephone+Network+(PSTN)&quot; rel=&quot;tag&quot;&gt;Public Switched Telephone Network (PSTN)&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Raytheon&quot; rel=&quot;tag&quot;&gt;Raytheon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/removeable+devices&quot; rel=&quot;tag&quot;&gt;removeable devices&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Report&quot; rel=&quot;tag&quot;&gt;Report&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ROI&quot; rel=&quot;tag&quot;&gt;ROI&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/sabotage&quot; rel=&quot;tag&quot;&gt;sabotage&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/shareholder+derivative&quot; rel=&quot;tag&quot;&gt;shareholder derivative&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Signaling+System+%237&quot; rel=&quot;tag&quot;&gt;Signaling System #7&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Skype&quot; rel=&quot;tag&quot;&gt;Skype&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/SS7&quot; rel=&quot;tag&quot;&gt;SS7&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/steal&quot; rel=&quot;tag&quot;&gt;steal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/telecommunications&quot; rel=&quot;tag&quot;&gt;telecommunications&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Time+Warner&quot; rel=&quot;tag&quot;&gt;Time Warner&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/VOIP&quot; rel=&quot;tag&quot;&gt;VOIP&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Vonage&quot; rel=&quot;tag&quot;&gt;Vonage&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:e46ed530-1311-4701-b167-0426957bfd35&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;LiveJournal Tags: &lt;a href=&quot;http://www.livejournal.com/interests.bml?int=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=CableVision&quot; rel=&quot;tag&quot;&gt;CableVision&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=class+action&quot; rel=&quot;tag&quot;&gt;class action&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Comcast&quot; rel=&quot;tag&quot;&gt;Comcast&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=DNS&quot; rel=&quot;tag&quot;&gt;DNS&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=DOD&quot; rel=&quot;tag&quot;&gt;DOD&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Domain+Name+System&quot; rel=&quot;tag&quot;&gt;Domain Name System&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Emerson+Development+LLC&quot; rel=&quot;tag&quot;&gt;Emerson Development LLC&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=espionage&quot; rel=&quot;tag&quot;&gt;espionage&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=hacking&quot; rel=&quot;tag&quot;&gt;hacking&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Harry+Emerson+III&quot; rel=&quot;tag&quot;&gt;Harry Emerson III&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=infiltrate&quot; rel=&quot;tag&quot;&gt;infiltrate&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=interview&quot; rel=&quot;tag&quot;&gt;interview&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=intrusion&quot; rel=&quot;tag&quot;&gt;intrusion&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=iphone&quot; rel=&quot;tag&quot;&gt;iphone&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=IronPipe&quot; rel=&quot;tag&quot;&gt;IronPipe&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Jacqueline+Herships&quot; rel=&quot;tag&quot;&gt;Jacqueline Herships&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Managed+Security&quot; rel=&quot;tag&quot;&gt;Managed Security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=markets&quot; rel=&quot;tag&quot;&gt;markets&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=meltdown&quot; rel=&quot;tag&quot;&gt;meltdown&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=paperless&quot; rel=&quot;tag&quot;&gt;paperless&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=POTS&quot; rel=&quot;tag&quot;&gt;POTS&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Public+Switched+Telephone+Network+(PSTN)&quot; rel=&quot;tag&quot;&gt;Public Switched Telephone Network (PSTN)&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Raytheon&quot; rel=&quot;tag&quot;&gt;Raytheon&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=removeable+devices&quot; rel=&quot;tag&quot;&gt;removeable devices&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Report&quot; rel=&quot;tag&quot;&gt;Report&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=ROI&quot; rel=&quot;tag&quot;&gt;ROI&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=sabotage&quot; rel=&quot;tag&quot;&gt;sabotage&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=shareholder+derivative&quot; rel=&quot;tag&quot;&gt;shareholder derivative&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Signaling+System+%237&quot; rel=&quot;tag&quot;&gt;Signaling System #7&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Skype&quot; rel=&quot;tag&quot;&gt;Skype&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=SS7&quot; rel=&quot;tag&quot;&gt;SS7&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=steal&quot; rel=&quot;tag&quot;&gt;steal&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=telecommunications&quot; rel=&quot;tag&quot;&gt;telecommunications&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Time+Warner&quot; rel=&quot;tag&quot;&gt;Time Warner&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=VOIP&quot; rel=&quot;tag&quot;&gt;VOIP&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Vonage&quot; rel=&quot;tag&quot;&gt;Vonage&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:be000187-e432-4d36-8205-727a0569173a&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Flickr Tags: &lt;a href=&quot;http://flickr.com/photos/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/CableVision&quot; rel=&quot;tag&quot;&gt;CableVision&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/class+action&quot; rel=&quot;tag&quot;&gt;class action&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Comcast&quot; rel=&quot;tag&quot;&gt;Comcast&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/DNS&quot; rel=&quot;tag&quot;&gt;DNS&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/DOD&quot; rel=&quot;tag&quot;&gt;DOD&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Domain+Name+System&quot; rel=&quot;tag&quot;&gt;Domain Name System&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Emerson+Development+LLC&quot; rel=&quot;tag&quot;&gt;Emerson Development LLC&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/espionage&quot; rel=&quot;tag&quot;&gt;espionage&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/hacking&quot; rel=&quot;tag&quot;&gt;hacking&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Harry+Emerson+III&quot; rel=&quot;tag&quot;&gt;Harry Emerson III&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/infiltrate&quot; rel=&quot;tag&quot;&gt;infiltrate&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/interview&quot; rel=&quot;tag&quot;&gt;interview&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/intrusion&quot; rel=&quot;tag&quot;&gt;intrusion&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/iphone&quot; rel=&quot;tag&quot;&gt;iphone&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/IronPipe&quot; rel=&quot;tag&quot;&gt;IronPipe&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Jacqueline+Herships&quot; rel=&quot;tag&quot;&gt;Jacqueline Herships&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Managed+Security&quot; rel=&quot;tag&quot;&gt;Managed Security&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/markets&quot; rel=&quot;tag&quot;&gt;markets&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/meltdown&quot; rel=&quot;tag&quot;&gt;meltdown&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/paperless&quot; rel=&quot;tag&quot;&gt;paperless&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/POTS&quot; rel=&quot;tag&quot;&gt;POTS&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Public+Switched+Telephone+Network+(PSTN)&quot; rel=&quot;tag&quot;&gt;Public Switched Telephone Network (PSTN)&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Raytheon&quot; rel=&quot;tag&quot;&gt;Raytheon&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/removeable+devices&quot; rel=&quot;tag&quot;&gt;removeable devices&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Report&quot; rel=&quot;tag&quot;&gt;Report&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/ROI&quot; rel=&quot;tag&quot;&gt;ROI&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/sabotage&quot; rel=&quot;tag&quot;&gt;sabotage&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/shareholder+derivative&quot; rel=&quot;tag&quot;&gt;shareholder derivative&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Signaling+System+%237&quot; rel=&quot;tag&quot;&gt;Signaling System #7&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Skype&quot; rel=&quot;tag&quot;&gt;Skype&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/SS7&quot; rel=&quot;tag&quot;&gt;SS7&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/steal&quot; rel=&quot;tag&quot;&gt;steal&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/telecommunications&quot; rel=&quot;tag&quot;&gt;telecommunications&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Time+Warner&quot; rel=&quot;tag&quot;&gt;Time Warner&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/VOIP&quot; rel=&quot;tag&quot;&gt;VOIP&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Vonage&quot; rel=&quot;tag&quot;&gt;Vonage&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:a082ef93-86b4-4b8f-8408-46457a2e6028&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/CableVision&quot; rel=&quot;tag&quot;&gt;CableVision&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/class+action&quot; rel=&quot;tag&quot;&gt;class action&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Comcast&quot; rel=&quot;tag&quot;&gt;Comcast&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DNS&quot; rel=&quot;tag&quot;&gt;DNS&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DOD&quot; rel=&quot;tag&quot;&gt;DOD&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Domain+Name+System&quot; rel=&quot;tag&quot;&gt;Domain Name System&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Emerson+Development+LLC&quot; rel=&quot;tag&quot;&gt;Emerson Development LLC&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/espionage&quot; rel=&quot;tag&quot;&gt;espionage&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/hacking&quot; rel=&quot;tag&quot;&gt;hacking&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Harry+Emerson+III&quot; rel=&quot;tag&quot;&gt;Harry Emerson III&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infiltrate&quot; rel=&quot;tag&quot;&gt;infiltrate&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/interview&quot; rel=&quot;tag&quot;&gt;interview&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/intrusion&quot; rel=&quot;tag&quot;&gt;intrusion&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/iphone&quot; rel=&quot;tag&quot;&gt;iphone&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/IronPipe&quot; rel=&quot;tag&quot;&gt;IronPipe&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Jacqueline+Herships&quot; rel=&quot;tag&quot;&gt;Jacqueline Herships&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Managed+Security&quot; rel=&quot;tag&quot;&gt;Managed Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/markets&quot; rel=&quot;tag&quot;&gt;markets&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/meltdown&quot; rel=&quot;tag&quot;&gt;meltdown&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/paperless&quot; rel=&quot;tag&quot;&gt;paperless&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/POTS&quot; rel=&quot;tag&quot;&gt;POTS&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Public+Switched+Telephone+Network+(PSTN)&quot; rel=&quot;tag&quot;&gt;Public Switched Telephone Network (PSTN)&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Raytheon&quot; rel=&quot;tag&quot;&gt;Raytheon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/removeable+devices&quot; rel=&quot;tag&quot;&gt;removeable devices&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Report&quot; rel=&quot;tag&quot;&gt;Report&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ROI&quot; rel=&quot;tag&quot;&gt;ROI&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/sabotage&quot; rel=&quot;tag&quot;&gt;sabotage&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/shareholder+derivative&quot; rel=&quot;tag&quot;&gt;shareholder derivative&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Signaling+System+%237&quot; rel=&quot;tag&quot;&gt;Signaling System #7&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Skype&quot; rel=&quot;tag&quot;&gt;Skype&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/SS7&quot; rel=&quot;tag&quot;&gt;SS7&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/steal&quot; rel=&quot;tag&quot;&gt;steal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/telecommunications&quot; rel=&quot;tag&quot;&gt;telecommunications&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Time+Warner&quot; rel=&quot;tag&quot;&gt;Time Warner&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/VOIP&quot; rel=&quot;tag&quot;&gt;VOIP&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Vonage&quot; rel=&quot;tag&quot;&gt;Vonage&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:0d2c1e79-c571-4e4d-91bf-d350a56c57c5&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=CableVision&quot; rel=&quot;tag&quot;&gt;CableVision&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=class+action&quot; rel=&quot;tag&quot;&gt;class action&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Comcast&quot; rel=&quot;tag&quot;&gt;Comcast&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DNS&quot; rel=&quot;tag&quot;&gt;DNS&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DOD&quot; rel=&quot;tag&quot;&gt;DOD&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Domain+Name+System&quot; rel=&quot;tag&quot;&gt;Domain Name System&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Emerson+Development+LLC&quot; rel=&quot;tag&quot;&gt;Emerson Development LLC&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=espionage&quot; rel=&quot;tag&quot;&gt;espionage&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=hacking&quot; rel=&quot;tag&quot;&gt;hacking&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Harry+Emerson+III&quot; rel=&quot;tag&quot;&gt;Harry Emerson III&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infiltrate&quot; rel=&quot;tag&quot;&gt;infiltrate&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=interview&quot; rel=&quot;tag&quot;&gt;interview&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=intrusion&quot; rel=&quot;tag&quot;&gt;intrusion&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=iphone&quot; rel=&quot;tag&quot;&gt;iphone&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=IronPipe&quot; rel=&quot;tag&quot;&gt;IronPipe&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Jacqueline+Herships&quot; rel=&quot;tag&quot;&gt;Jacqueline Herships&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Managed+Security&quot; rel=&quot;tag&quot;&gt;Managed Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=markets&quot; rel=&quot;tag&quot;&gt;markets&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=meltdown&quot; rel=&quot;tag&quot;&gt;meltdown&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=paperless&quot; rel=&quot;tag&quot;&gt;paperless&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=POTS&quot; rel=&quot;tag&quot;&gt;POTS&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Public+Switched+Telephone+Network+(PSTN)&quot; rel=&quot;tag&quot;&gt;Public Switched Telephone Network (PSTN)&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Raytheon&quot; rel=&quot;tag&quot;&gt;Raytheon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=removeable+devices&quot; rel=&quot;tag&quot;&gt;removeable devices&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Report&quot; rel=&quot;tag&quot;&gt;Report&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ROI&quot; rel=&quot;tag&quot;&gt;ROI&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=sabotage&quot; rel=&quot;tag&quot;&gt;sabotage&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=shareholder+derivative&quot; rel=&quot;tag&quot;&gt;shareholder derivative&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Signaling+System+%237&quot; rel=&quot;tag&quot;&gt;Signaling System #7&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Skype&quot; rel=&quot;tag&quot;&gt;Skype&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=SS7&quot; rel=&quot;tag&quot;&gt;SS7&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=steal&quot; rel=&quot;tag&quot;&gt;steal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=telecommunications&quot; rel=&quot;tag&quot;&gt;telecommunications&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Time+Warner&quot; rel=&quot;tag&quot;&gt;Time Warner&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=VOIP&quot; rel=&quot;tag&quot;&gt;VOIP&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Vonage&quot; rel=&quot;tag&quot;&gt;Vonage&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:0f3f4a55-987e-4339-9d57-a63d4e84905e&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;43 Things Tags: &lt;a href=&quot;http://www.43things.com/tag/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/CableVision&quot; rel=&quot;tag&quot;&gt;CableVision&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/class+action&quot; rel=&quot;tag&quot;&gt;class action&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Comcast&quot; rel=&quot;tag&quot;&gt;Comcast&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/DNS&quot; rel=&quot;tag&quot;&gt;DNS&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/DOD&quot; rel=&quot;tag&quot;&gt;DOD&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Domain+Name+System&quot; rel=&quot;tag&quot;&gt;Domain Name System&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Emerson+Development+LLC&quot; rel=&quot;tag&quot;&gt;Emerson Development LLC&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/espionage&quot; rel=&quot;tag&quot;&gt;espionage&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/hacking&quot; rel=&quot;tag&quot;&gt;hacking&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Harry+Emerson+III&quot; rel=&quot;tag&quot;&gt;Harry Emerson III&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/infiltrate&quot; rel=&quot;tag&quot;&gt;infiltrate&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/interview&quot; rel=&quot;tag&quot;&gt;interview&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/intrusion&quot; rel=&quot;tag&quot;&gt;intrusion&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/iphone&quot; rel=&quot;tag&quot;&gt;iphone&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/IronPipe&quot; rel=&quot;tag&quot;&gt;IronPipe&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Jacqueline+Herships&quot; rel=&quot;tag&quot;&gt;Jacqueline Herships&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Managed+Security&quot; rel=&quot;tag&quot;&gt;Managed Security&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/markets&quot; rel=&quot;tag&quot;&gt;markets&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/meltdown&quot; rel=&quot;tag&quot;&gt;meltdown&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/paperless&quot; rel=&quot;tag&quot;&gt;paperless&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/POTS&quot; rel=&quot;tag&quot;&gt;POTS&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Public+Switched+Telephone+Network+(PSTN)&quot; rel=&quot;tag&quot;&gt;Public Switched Telephone Network (PSTN)&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Raytheon&quot; rel=&quot;tag&quot;&gt;Raytheon&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/removeable+devices&quot; rel=&quot;tag&quot;&gt;removeable devices&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Report&quot; rel=&quot;tag&quot;&gt;Report&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/ROI&quot; rel=&quot;tag&quot;&gt;ROI&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/sabotage&quot; rel=&quot;tag&quot;&gt;sabotage&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/shareholder+derivative&quot; rel=&quot;tag&quot;&gt;shareholder derivative&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Signaling+System+%237&quot; rel=&quot;tag&quot;&gt;Signaling System #7&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Skype&quot; rel=&quot;tag&quot;&gt;Skype&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/SS7&quot; rel=&quot;tag&quot;&gt;SS7&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/steal&quot; rel=&quot;tag&quot;&gt;steal&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/telecommunications&quot; rel=&quot;tag&quot;&gt;telecommunications&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Time+Warner&quot; rel=&quot;tag&quot;&gt;Time Warner&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/VOIP&quot; rel=&quot;tag&quot;&gt;VOIP&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Vonage&quot; rel=&quot;tag&quot;&gt;Vonage&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:79261d8f-fdf1-4b4e-8766-b548d5c387b9&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Apple&quot; rel=&quot;tag&quot;&gt;Apple&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Breach&quot; rel=&quot;tag&quot;&gt;Breach&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/breaches&quot; rel=&quot;tag&quot;&gt;breaches&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/CableVision&quot; rel=&quot;tag&quot;&gt;CableVision&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/class+action&quot; rel=&quot;tag&quot;&gt;class action&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Comcast&quot; rel=&quot;tag&quot;&gt;Comcast&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DDoS&quot; rel=&quot;tag&quot;&gt;DDoS&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DNS&quot; rel=&quot;tag&quot;&gt;DNS&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DOD&quot; rel=&quot;tag&quot;&gt;DOD&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Domain+Name+System&quot; rel=&quot;tag&quot;&gt;Domain Name System&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Emerson+Development+LLC&quot; rel=&quot;tag&quot;&gt;Emerson Development LLC&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/espionage&quot; rel=&quot;tag&quot;&gt;espionage&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/hacking&quot; rel=&quot;tag&quot;&gt;hacking&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Harry+Emerson+III&quot; rel=&quot;tag&quot;&gt;Harry Emerson III&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/homeland+Security&quot; rel=&quot;tag&quot;&gt;homeland Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ID&quot; rel=&quot;tag&quot;&gt;ID&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/identity+thief&quot; rel=&quot;tag&quot;&gt;identity thief&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infiltrate&quot; rel=&quot;tag&quot;&gt;infiltrate&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/interview&quot; rel=&quot;tag&quot;&gt;interview&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/intrusion&quot; rel=&quot;tag&quot;&gt;intrusion&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/iphone&quot; rel=&quot;tag&quot;&gt;iphone&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/IronPipe&quot; rel=&quot;tag&quot;&gt;IronPipe&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Jacqueline+Herships&quot; rel=&quot;tag&quot;&gt;Jacqueline Herships&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Managed+Security&quot; rel=&quot;tag&quot;&gt;Managed Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/markets&quot; rel=&quot;tag&quot;&gt;markets&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/meltdown&quot; rel=&quot;tag&quot;&gt;meltdown&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/paperless&quot; rel=&quot;tag&quot;&gt;paperless&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/POTS&quot; rel=&quot;tag&quot;&gt;POTS&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Public+Switched+Telephone+Network+(PSTN)&quot; rel=&quot;tag&quot;&gt;Public Switched Telephone Network (PSTN)&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Raytheon&quot; rel=&quot;tag&quot;&gt;Raytheon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/removeable+devices&quot; rel=&quot;tag&quot;&gt;removeable devices&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Report&quot; rel=&quot;tag&quot;&gt;Report&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ROI&quot; rel=&quot;tag&quot;&gt;ROI&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/sabotage&quot; rel=&quot;tag&quot;&gt;sabotage&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/shareholder+derivative&quot; rel=&quot;tag&quot;&gt;shareholder derivative&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Signaling+System+%237&quot; rel=&quot;tag&quot;&gt;Signaling System #7&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Skype&quot; rel=&quot;tag&quot;&gt;Skype&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/SS7&quot; rel=&quot;tag&quot;&gt;SS7&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/steal&quot; rel=&quot;tag&quot;&gt;steal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/telecommunications&quot; rel=&quot;tag&quot;&gt;telecommunications&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/theft&quot; rel=&quot;tag&quot;&gt;theft&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Time+Warner&quot; rel=&quot;tag&quot;&gt;Time Warner&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/VOIP&quot; rel=&quot;tag&quot;&gt;VOIP&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Vonage&quot; rel=&quot;tag&quot;&gt;Vonage&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/07/securing-hacker-free-zone-on-internet_28.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh3.ggpht.com/_9STd2plIvHE/Sm8jeUue49I/AAAAAAAAAGk/MgJOQ62bFhI/s72-c/Jackie%20Herships_thumb%5B11%5D.jpg?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-7153490972006326489</guid><pubDate>Wed, 24 Jun 2009 00:37:00 +0000</pubDate><atom:updated>2009-06-23T19:37:04.919-05:00</atom:updated><title></title><description>Summer Reading for Security Pros: Schneier or Sagan? - CSO Online - Security and Risk (&lt;a href=&quot;http://ping.fm/iuORL&quot;&gt;http://ping.fm/iuORL&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/summer-reading-for-security-pros_23.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-8295532932415582043</guid><pubDate>Wed, 24 Jun 2009 00:22:00 +0000</pubDate><atom:updated>2009-06-23T19:22:02.849-05:00</atom:updated><title></title><description>A Guide for Full Field Background Checks : Information Security Resources (&lt;a href=&quot;http://ping.fm/mSQQ7&quot;&gt;http://ping.fm/mSQQ7&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/guide-for-full-field-background-checks.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-1318205971462787061</guid><pubDate>Tue, 23 Jun 2009 22:22:00 +0000</pubDate><atom:updated>2009-06-23T17:22:27.919-05:00</atom:updated><title></title><description>homeatm.net (&lt;a href=&quot;http://homeatm.net/&quot;&gt;http://homeatm.net/&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/homeatm.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-7520773789059901621</guid><pubDate>Tue, 23 Jun 2009 22:17:00 +0000</pubDate><atom:updated>2009-06-23T17:17:04.749-05:00</atom:updated><title></title><description>PIN Debit Payments Blog: Preview of HomeATM&#39;s Newly Redesigned Website (&lt;a href=&quot;http://ping.fm/ni2SH&quot;&gt;http://ping.fm/ni2SH&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/pin-debit-payments-blog-preview-of.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-4161421227299709841</guid><pubDate>Tue, 23 Jun 2009 22:14:00 +0000</pubDate><atom:updated>2009-06-23T17:14:33.553-05:00</atom:updated><title></title><description>(Never) Always Set Up QA Before Production : Information Security Resources (&lt;a href=&quot;http://ping.fm/EAUWv&quot;&gt;http://ping.fm/EAUWv&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/never-always-set-up-qa-before.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-7674105725637675581</guid><pubDate>Tue, 23 Jun 2009 22:11:00 +0000</pubDate><atom:updated>2009-06-23T17:11:52.371-05:00</atom:updated><title></title><description>Internet Security Alliance Updates 6-23-09 : Information Security Resources (&lt;a href=&quot;http://ping.fm/9feus&quot;&gt;http://ping.fm/9feus&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/internet-security-alliance-updates-6-23.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-4928399575773285487</guid><pubDate>Sat, 13 Jun 2009 20:40:00 +0000</pubDate><atom:updated>2009-06-13T15:40:24.559-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anderson Cooper</category><category domain="http://www.blogger.com/atom/ns#">Bill Brenner</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">confidential</category><category domain="http://www.blogger.com/atom/ns#">CSO Online</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Space</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">Icerocket</category><category domain="http://www.blogger.com/atom/ns#">ID Theft</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Kevin Nixon</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">scams</category><category domain="http://www.blogger.com/atom/ns#">Zero Day Attack</category><title>Cyberwar - Privacy May Be a Victim in Cyberdefense Plan - Series - NYTimes.com</title><description>&lt;p&gt;&lt;a href=&quot;http://www.nytimes.com/&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;http://www.nytimes.com/&quot; border=&quot;0&quot; alt=&quot;http://www.nytimes.com/&quot; src=&quot;http://lh6.ggpht.com/_9STd2plIvHE/SjQOt9feMwI/AAAAAAAAAGU/V77B3YsXtDE/nytlogo153x23%5B23%5D.gif?imgmax=800&quot; width=&quot;185&quot; height=&quot;39&quot; /&gt;&lt;/a&gt;&amp;#160; &lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;June 13, 2009&lt;/p&gt;    &lt;p&gt;Cyberwar - &lt;a title=&quot;The New York Times&quot; href=&quot;http://www.nytimes.com/&quot;&gt;The New York Times&lt;/a&gt;&lt;/p&gt;    &lt;h3&gt;Privacy May Be a Victim in Cyberdefense Plan &lt;/h3&gt;    &lt;p&gt;By &lt;a href=&quot;http://topics.nytimes.com/top/reference/timestopics/people/s/thom_shanker/index.html?inline=nyt-per&quot;&gt;THOM SHANKER&lt;/a&gt; and &lt;a href=&quot;http://topics.nytimes.com/top/reference/timestopics/people/s/david_e_sanger/index.html?inline=nyt-per&quot;&gt;DAVID E. SANGER&lt;/a&gt;&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;WASHINGTON — A plan to create a new Pentagon cybercommand is raising significant privacy and diplomatic concerns, as the Obama administration moves ahead on efforts to protect the nation from cyberattack and to prepare for possible offensive operations against adversaries’ computer networks. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;&lt;a href=&quot;http://topics.nytimes.com/top/reference/timestopics/people/o/barack_obama/index.html?inline=nyt-per&quot;&gt;President Obama&lt;/a&gt; has said that the new cyberdefense strategy he unveiled last month will provide protections for personal privacy and civil liberties. But senior Pentagon and military officials say that Mr. Obama’s assurances may be challenging to guarantee in practice, particularly in trying to monitor the thousands of daily attacks on security systems in the United States that have set off a race to develop better cyberweapons. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Much of the new military command’s work is expected to be carried out by the &lt;a href=&quot;http://topics.nytimes.com/top/reference/timestopics/organizations/n/national_security_agency/index.html?inline=nyt-org&quot;&gt;National Security Agency&lt;/a&gt;, whose role in intercepting the domestic end of international calls and e-mail messages after the Sept. 11, 2001, attacks, under secret orders issued by the Bush administration, has already generated intense controversy. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;There is simply no way, the officials say, to effectively conduct computer operations without entering networks inside the United States, where the military is prohibited from operating, or traveling electronic paths through countries that are not themselves American targets.&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;The cybersecurity effort, Mr. Obama said at the White House last month, “will not — I repeat, will not — include monitoring private sector networks or Internet traffic.”&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;But foreign adversaries often mount their attacks through computer network hubs inside the United States, and military officials and outside experts say that threat confronts the Pentagon and the administration with difficult questions. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Military officials say there may be a need to intercept and examine some e-mail messages sent from other countries to guard against computer viruses or potential terrorist action. Advocates say the process could ultimately be accepted as the digital equivalent of customs inspections, in which passengers arriving from overseas consent to have their luggage opened for security, tax and health reasons. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;“The government is in a quandary,” said Maren Leed, a defense expert at the bipartisan &lt;a href=&quot;http://topics.nytimes.com/top/reference/timestopics/organizations/c/center_for_strategic_and_international_studies/index.html?inline=nyt-org&quot;&gt;Center for Strategic and International Studies&lt;/a&gt; who was a Pentagon special assistant on cyberoperations from 2005 to 2008. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Ms. Leed said a broad debate was needed “about what constitutes an intrusion that violates privacy and, at the other extreme, what is an intrusion that may be acceptable in the face of an act of war.”&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;In a recent speech, Gen. James E. Cartwright, vice chairman of the &lt;a href=&quot;http://topics.nytimes.com/top/reference/timestopics/organizations/j/joint_chiefs_of_staff/index.html?inline=nyt-org&quot;&gt;Joint Chiefs of Staff&lt;/a&gt; and a chief architect of the new cyberstrategy, acknowledged that a major unresolved issue was how the military — which would include the National Security Agency, where much of the cyberwar expertise resides — could legally set up an early warning system.&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Unlike a missile attack, which would show up on the Pentagon’s screens long before reaching American territory, a cyberattack may be visible only after it has been launched in the United States. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;“How do you understand sovereignty in the cyberdomain?” General Cartwright asked. “It doesn’t tend to pay a lot of attention to geographic boundaries.”&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;For example, the daily attacks on the Pentagon’s own computer systems, or probes sent from Russia, China and Eastern Europe seeking chinks in the computer systems of corporations and financial institutions, are rarely seen before their effect is felt inside the United States.&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Some administration officials have begun to discuss whether laws or regulations must be changed to allow law enforcement, the military or intelligence agencies greater access to networks or Internet providers when significant evidence of a national security threat was found.&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Ms. Leed said that while the Defense Department and related intelligence agencies were the only organizations that had the ability to protect against such cyberattacks, “they are not the best suited, from a civil liberties perspective, to take on that responsibility.”&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Under plans being completed at the Pentagon, the new cybercommand will be run by a four-star general, much the way Gen. &lt;a href=&quot;http://topics.nytimes.com/top/reference/timestopics/people/p/david_h_petraeus/index.html?inline=nyt-per&quot;&gt;David H. Petraeus&lt;/a&gt; runs the wars in Afghanistan and Iraq from Central Command in Tampa, Fla. But the expectation is that whoever is in charge of the new command will also direct the National Security Agency, an effort to solve the turf war between the spy agency and the military over who is in charge of conducting offensive operations. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;While the N.S.A.’s job is chiefly one of detection and monitoring, the agency also possesses what Michael D. McConnell, the former director of national intelligence, called “the critical skill set” to respond quickly to cyberattacks. Yet the Defense Department views cyberspace as its domain as well, a new battleground after land, sea, air and space. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;The complications are not limited to privacy concerns. The Pentagon is increasingly worried about the diplomatic ramifications of being forced to use the computer networks of many other nations while carrying out digital missions — the computer equivalent of the Vietnam War’s spilling over the Cambodian border in the 1960s. To battle Russian hackers, for example, it might be necessary to act through the virtual cyberterritory of Britain or Germany or any country where the attack was routed.&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;General Cartwright said military planners were trying to write rules of engagement for scenarios in which a cyberattack was launched from a neutral country that might have no idea what was going on. But, with time of the essence, it may not be possible, the scenarios show, to ask other nations to act against an attack that is flowing through their computers in milliseconds. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;“If I pass through your country, do I have to talk to the ambassador?” General Cartwright said. “It is very difficult. Those are the questions that are now really starting to emerge vis-à-vis cyber.”&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Frida Berrigan, a longtime peace activist who is a senior program associate at the New America Foundation’s arms and security initiative, expressed concerns about whether the Obama administration would be able to balance its promise to respect privacy in cyberspace even as it appeared to be militarizing cybersecurity.&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;“Obama was very deliberate in saying that the U.S. military and the U.S. government would not be looking at our e-mail and not tracking what we do online,” Ms. Berrigan said. “This is not to say there is not a cyberthreat out there or that cyberterrorism is not a significant concern. We should be vigilant and creative. But once again we see the Pentagon being put at the heart of it and at front lines of offering a solution.”&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Ms. Berrigan said that just as the counterinsurgency wars in Iraq and Afghanistan had proved that “there is no front line anymore, and no demilitarized zone anymore, then if the Pentagon and the military services see cyberspace as a battlefield domain, then the lines protecting privacy and our civil liberties get blurred very, very quickly.”&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;&lt;a href=&quot;http://www.nytimes.com/2009/06/13/us/politics/13cyber.html?_r=1&amp;amp;pagewanted=print&quot;&gt;Cyberwar - Privacy May Be a Victim in Cyberdefense Plan - Series - NYTimes.com&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:005e20dc-f239-4591-b24e-ab55f9c65a4f&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;LiveJournal Tags: &lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyberwar&quot; rel=&quot;tag&quot;&gt;cyberwar&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyberthreat&quot; rel=&quot;tag&quot;&gt;cyberthreat&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyberattack&quot; rel=&quot;tag&quot;&gt;cyberattack&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=data+privacy&quot; rel=&quot;tag&quot;&gt;data privacy&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=CIO&quot; rel=&quot;tag&quot;&gt;CIO&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=CISSP&quot; rel=&quot;tag&quot;&gt;CISSP&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=CISM&quot; rel=&quot;tag&quot;&gt;CISM&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=CGEIT&quot; rel=&quot;tag&quot;&gt;CGEIT&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=%23hackers&quot; rel=&quot;tag&quot;&gt;#hackers&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=%23ISR&quot; rel=&quot;tag&quot;&gt;#ISR&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=%23cybersecurity&quot; rel=&quot;tag&quot;&gt;#cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=%23data+privacy&quot; rel=&quot;tag&quot;&gt;#data privacy&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=%23cyberthreat&quot; rel=&quot;tag&quot;&gt;#cyberthreat&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=%23cyberattack&quot; rel=&quot;tag&quot;&gt;#cyberattack&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=%23icerocket&quot; rel=&quot;tag&quot;&gt;#icerocket&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:bfe256df-ac3b-4b51-9cf9-aa1c88667a7e&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyberwar&quot; rel=&quot;tag&quot;&gt;cyberwar&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyberthreat&quot; rel=&quot;tag&quot;&gt;cyberthreat&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyberattack&quot; rel=&quot;tag&quot;&gt;cyberattack&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/data+privacy&quot; rel=&quot;tag&quot;&gt;data privacy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/CIO&quot; rel=&quot;tag&quot;&gt;CIO&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/CISSP&quot; rel=&quot;tag&quot;&gt;CISSP&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/CISM&quot; rel=&quot;tag&quot;&gt;CISM&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/CGEIT&quot; rel=&quot;tag&quot;&gt;CGEIT&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/%23hackers&quot; rel=&quot;tag&quot;&gt;#hackers&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/%23ISR&quot; rel=&quot;tag&quot;&gt;#ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/%23cybersecurity&quot; rel=&quot;tag&quot;&gt;#cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/%23data+privacy&quot; rel=&quot;tag&quot;&gt;#data privacy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/%23cyberthreat&quot; rel=&quot;tag&quot;&gt;#cyberthreat&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/%23cyberattack&quot; rel=&quot;tag&quot;&gt;#cyberattack&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/%23icerocket&quot; rel=&quot;tag&quot;&gt;#icerocket&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/06/cyberwar-privacy-may-be-victim-in.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh6.ggpht.com/_9STd2plIvHE/SjQOt9feMwI/AAAAAAAAAGU/V77B3YsXtDE/s72-c/nytlogo153x23%5B23%5D.gif?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-3746162821852878071</guid><pubDate>Sat, 13 Jun 2009 06:52:00 +0000</pubDate><atom:updated>2009-06-13T01:52:02.879-05:00</atom:updated><title></title><description>Sky News Australia - Swine Flu (&lt;a href=&quot;http://ping.fm/MxFyz&quot;&gt;http://ping.fm/MxFyz&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/sky-news-australia-swine-flu-httpping.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-6150514974356036329</guid><pubDate>Sat, 13 Jun 2009 06:20:00 +0000</pubDate><atom:updated>2009-06-13T01:20:59.006-05:00</atom:updated><title></title><description>Linda McGlasson (InfoSec_Girl) on Twitter (&lt;a href=&quot;http://ping.fm/hScio&quot;&gt;http://ping.fm/hScio&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/linda-mcglasson-infosecgirl-on-twitter.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-4752203246859730570</guid><pubDate>Sat, 13 Jun 2009 04:00:00 +0000</pubDate><atom:updated>2009-06-12T23:00:54.566-05:00</atom:updated><title></title><description>Summer Reading for Security Pros: Schneier or Sagan? | Security - InfoWorld (&lt;a href=&quot;http://ping.fm/menhW&quot;&gt;http://ping.fm/menhW&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/summer-reading-for-security-pros.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-5223439894939873580</guid><pubDate>Sat, 13 Jun 2009 03:20:00 +0000</pubDate><atom:updated>2009-06-12T22:20:01.233-05:00</atom:updated><title></title><description>Internet Security Alliance Updates 6-12-09 : Information Security Resources (&lt;a href=&quot;http://ping.fm/g99L7&quot;&gt;http://ping.fm/g99L7&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/internet-security-alliance-updates-6-12.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-4435372560537501585</guid><pubDate>Sat, 13 Jun 2009 03:13:00 +0000</pubDate><atom:updated>2009-06-12T22:13:12.580-05:00</atom:updated><title></title><description>How Facebook and Twitter Are Changing Data Privacy Rules ( - Internet - Security ) (&lt;a href=&quot;http://ow.ly/dQuf&quot;&gt;http://ow.ly/dQuf&lt;/a&gt;)</description><link>http://thedailysandbox.blogspot.com/2009/06/how-facebook-and-twitter-are-changing.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-8122641240329559744</guid><pubDate>Fri, 12 Jun 2009 02:29:00 +0000</pubDate><atom:updated>2009-06-11T21:29:46.874-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Bill Brenner</category><category domain="http://www.blogger.com/atom/ns#">Business Continuity</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">Global Health Emergency</category><category domain="http://www.blogger.com/atom/ns#">Icerocket</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Pandemic Influenza Planning</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><title>WHO Declares Swine flu a Pandemic. Now What?</title><description>&lt;p&gt;From: &lt;a href=&quot;http://www.csoonline.com/&quot;&gt;www.csoonline.com&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;The World Health Organization has raised its pandemic alert level to 6, making swine flu the first true pandemic in more than 40 years. Here&#39;s what it means for your company. &lt;/p&gt;  &lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;WHO Declares Swine flu a Pandemic. Now What?&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://lh5.ggpht.com/_9STd2plIvHE/SjG9l-YwoyI/AAAAAAAAAGI/cHPGug3I76Q/s1600-h/clip_image001%5B3%5D.jpg&quot;&gt;&lt;img style=&quot;border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;clip_image001&quot; border=&quot;0&quot; hspace=&quot;12&quot; alt=&quot;clip_image001&quot; src=&quot;http://lh4.ggpht.com/_9STd2plIvHE/SjG9mOLGdkI/AAAAAAAAAGM/w9lTU51BqH0/clip_image001_thumb.jpg?imgmax=800&quot; width=&quot;154&quot; height=&quot;168&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;by &lt;a href=&quot;http://www.csoonline.com/article/494859/WHO_Declares_Swine_flu_a_Pandemic._Now_What_&quot;&gt;Bill Brenner, Senior Editor, CSO&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;June 11, 2009&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;The World Health Organization (WHO) has officially declared &lt;a href=&quot;http://www.csoonline.com/topic/43406/Pandemic&quot;&gt;swine flu the first pandemic in more than 40 years&lt;/a&gt;.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;The news arrived with none of the panic that swirled in the air when news of the virus first emerged in late April. But security experts say there are still actions emergency planners should be taking to ensure order if later waves of the H1N1 virus prove more deadly.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.who.int/csr/disease/avian_influenza/phase/en/index.html&quot;&gt;By raising the pandemic level to Phase 6, WHO has confirmed that sustained human-to-human transmission&lt;/a&gt; of the virus is happening at the community-level in multiple countries. To date, the virus has appeared in 74 countries, including Mexico, the US, UK, Australia, Japan, and Chile. There have been approximately 28,000 cases with 141 deaths so far, though the move to Phase 6 does not necessarily mean swine flu is causing more severe illness or more deaths.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;But it does mean the world is threatened by an unpredictable virus that could grow weaker or stronger with time. History has shown that pandemics often start with a mild first wave, followed in the fall and winter by a more lethal wave. The best example of this was the Spanish Influenza of 1918-19, which killed roughly 50 million to 100 million people worldwide.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Emergency preparedness experts say there&#39;s no cause for panic, but that history serves as a reminder that organizations should always be thinking about how to keep the machinery moving in the event something big and unexpected happens. [See: &lt;a href=&quot;http://www.csoonline.com/article/492002&quot;&gt;Now That the Hype Is Over, Keep Planning&lt;/a&gt;]&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;For emergency planners, there are both physical and cyber security challenges to think about regarding swine flu and other potential pandemic viruses.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;On the physical side, private entities should be hammering out a game plan for who would do what and where if the government decided to restrict our movements to contain an outbreak, says &lt;a href=&quot;http://www.information-security-resources.com/&quot;&gt;Kevin Nixon&lt;/a&gt;, an emergency planning expert who has testified before Congress and served on infrastructure security boards and committees including the Disaster Recovery Workgroup for the Office of Homeland Security, and the Federal Trade Commission.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&amp;quot;Companies and employers that have not done so are being urged to establish a business continuity plan should the government direct state and local governments to immediately enforce their community containment plans,&amp;quot; Nixon says. [Podcast: &lt;a href=&quot;http://www.csoonline.com/podcast/490663&quot;&gt;How to Prepare for a Swine flu Pandemic&lt;/a&gt;]&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;If the Federal government does direct states and communities to implement their emergency plans, recommendations, based on the severity of the pandemic, may include:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;div align=&quot;justify&quot;&gt;Asking ill people to voluntarily remain at home and not go to work or out in the community for about 7-10 days or until they are well and can no longer spread the infection to others (ill individuals may be treated with influenza antiviral medications, as appropriate, if these medications are effective and available. &lt;/div&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;div align=&quot;justify&quot;&gt;Asking members of households with a person who is ill to voluntarily remain at home for about 7 days (household members may be provided with antiviral medications, if these medications are effective and sufficient in quantity and feasible mechanisms for their distribution have been developed). &lt;/div&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;div align=&quot;justify&quot;&gt;Dismissing students from schools (including public and private schools as well as colleges and universities) and school-based activities and closure of childcare programs for up to 12 weeks, coupled with protecting children and teenagers through social distancing in the community, to include reductions of out-of-school social contacts and community mixing. Childcare programs discussed in this guidance include centers or facilities that provide care to any number of children in a nonresidential setting, large family childcare homes that provide care for seven or more children in the home of the provider, and small family childcare homes that provide care to six or fewer children in the home of the provider. &lt;/div&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;div align=&quot;justify&quot;&gt;Recommending social distancing of adults in the community, which may include cancellation of large public gatherings; changing workplace environments and schedules to decrease social density and preserve a healthy workplace to the greatest extent possible without disrupting essential services; ensuring work-leave policies to align incentives and facilitate adherence with the measures outlined above. [Source: &lt;a href=&quot;http://www.csoonline.com/article/490915&quot;&gt;swine flu: How to Make Biz Continuity Plans&lt;/a&gt;, by &lt;a href=&quot;http://www.information-security-resources.com/&quot;&gt;Kevin Nixon&lt;/a&gt;] &lt;/div&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;p align=&quot;justify&quot;&gt;On the IT security side, organizations need to be thinking about how to stay on top of things like log monitoring and patch management in the event of sickness among the IT security staff.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Kevin Coleman, a strategic management consultant at Technolytics, says &lt;a href=&quot;http://www.csoonline.com/article/491319&quot;&gt;companies should also plan for limitations on business travel&lt;/a&gt; and even bringing in extra cleaning crews and keeping employees at home if they complain of so much as a sniffle.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&amp;quot;Encourage anyone who feels the least bit sick to stay home,&amp;quot; Coleman says. &amp;quot;If an employee can do all the work from home on company laptops and VPNs that they do in the office, there&#39;s no reason to have them come in. If you can limit exposure from the get-go, why wouldn&#39;t you?&amp;quot;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Meantime, Coleman said, companies should ramp up the cleaning crew activity that&#39;s already going on, mostly after office hours. Bringing in extra cleaning crews to wipe down heavily-touched surfaces like doors, walls, phones and keyboards is money well spent, he said.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&amp;quot;Employees can also do their part to limit the spread of flu by carrying around antibacterial hand wipes,&amp;quot; he said, noting that some of his clients have already pulled back on the amount of business travel employees can do.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;It&#39;s far from certain that we&#39;re in for a deadly 1918-style pandemic. Either way, security experts say going over the scenarios and building a game plan is time well spent.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;© CXO Media Inc.&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://ad.doubleclick.net/jump/idg.us.cxo.cso/article;pg=494859;pg=pandemic;lvl2=pandemic;lvl1=business_continuity;type=security;root=home;pos=imu;tile=3;sz=336x280;ord=1244737953186&quot;&gt;&lt;img style=&quot;border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;clip_image002&quot; border=&quot;0&quot; alt=&quot;clip_image002&quot; src=&quot;http://lh3.ggpht.com/_9STd2plIvHE/SjG9mT1YtqI/AAAAAAAAAGQ/208KALlrseI/clip_image002%5B3%5D.jpg?imgmax=800&quot; width=&quot;244&quot; height=&quot;206&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://www.csoonline.com/newsletters&quot;&gt;Subscribe to CSO Newsletters&lt;/a&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:e55e5aed-e168-4c5d-aeb0-991cd1dc34a5&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/Swine+Flu&quot; rel=&quot;tag&quot;&gt;Swine Flu&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Pandemic+Influenza+Planning&quot; rel=&quot;tag&quot;&gt;Pandemic Influenza Planning&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/WHO&quot; rel=&quot;tag&quot;&gt;WHO&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Global+Health+Emergency&quot; rel=&quot;tag&quot;&gt;Global Health Emergency&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Level+6+Pandemic&quot; rel=&quot;tag&quot;&gt;Level 6 Pandemic&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information+Security+Resources&quot; rel=&quot;tag&quot;&gt;Information Security Resources&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:19d45f8f-069d-43a6-b8ed-3020d5a6daf4&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;43 Things Tags: &lt;a href=&quot;http://www.43things.com/tag/Swine+Flu&quot; rel=&quot;tag&quot;&gt;Swine Flu&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Pandemic+Influenza+Planning&quot; rel=&quot;tag&quot;&gt;Pandemic Influenza Planning&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/WHO&quot; rel=&quot;tag&quot;&gt;WHO&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Global+Health+Emergency&quot; rel=&quot;tag&quot;&gt;Global Health Emergency&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Level+6+Pandemic&quot; rel=&quot;tag&quot;&gt;Level 6 Pandemic&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Information+Security+Resources&quot; rel=&quot;tag&quot;&gt;Information Security Resources&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:e774da13-bacf-430a-8912-0d362f45d24d&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=Swine+Flu&quot; rel=&quot;tag&quot;&gt;Swine Flu&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Pandemic+Influenza+Planning&quot; rel=&quot;tag&quot;&gt;Pandemic Influenza Planning&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=WHO&quot; rel=&quot;tag&quot;&gt;WHO&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Global+Health+Emergency&quot; rel=&quot;tag&quot;&gt;Global Health Emergency&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Level+6+Pandemic&quot; rel=&quot;tag&quot;&gt;Level 6 Pandemic&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information+Security+Resources&quot; rel=&quot;tag&quot;&gt;Information Security Resources&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:162d003f-6db3-4edf-82d3-6db00335d155&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/Swine+Flu&quot; rel=&quot;tag&quot;&gt;Swine Flu&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Pandemic+Influenza+Planning&quot; rel=&quot;tag&quot;&gt;Pandemic Influenza Planning&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/WHO&quot; rel=&quot;tag&quot;&gt;WHO&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Global+Health+Emergency&quot; rel=&quot;tag&quot;&gt;Global Health Emergency&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Level+6+Pandemic&quot; rel=&quot;tag&quot;&gt;Level 6 Pandemic&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information+Security+Resources&quot; rel=&quot;tag&quot;&gt;Information Security Resources&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:0fcd8867-9a72-4b0c-bd9e-47ebcc149952&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Flickr Tags: &lt;a href=&quot;http://flickr.com/photos/tags/Swine+Flu&quot; rel=&quot;tag&quot;&gt;Swine Flu&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Pandemic+Influenza+Planning&quot; rel=&quot;tag&quot;&gt;Pandemic Influenza Planning&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/WHO&quot; rel=&quot;tag&quot;&gt;WHO&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Global+Health+Emergency&quot; rel=&quot;tag&quot;&gt;Global Health Emergency&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Level+6+Pandemic&quot; rel=&quot;tag&quot;&gt;Level 6 Pandemic&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/Information+Security+Resources&quot; rel=&quot;tag&quot;&gt;Information Security Resources&lt;/a&gt;,&lt;a href=&quot;http://flickr.com/photos/tags/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:2f097acb-3bce-493a-abc0-81b4596fc006&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;LiveJournal Tags: &lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Swine+Flu&quot; rel=&quot;tag&quot;&gt;Swine Flu&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Pandemic+Influenza+Planning&quot; rel=&quot;tag&quot;&gt;Pandemic Influenza Planning&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=WHO&quot; rel=&quot;tag&quot;&gt;WHO&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Global+Health+Emergency&quot; rel=&quot;tag&quot;&gt;Global Health Emergency&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Level+6+Pandemic&quot; rel=&quot;tag&quot;&gt;Level 6 Pandemic&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information+Security+Resources&quot; rel=&quot;tag&quot;&gt;Information Security Resources&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:8a57769c-d8e3-438b-8b49-c387af9519fb&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/Swine+Flu&quot; rel=&quot;tag&quot;&gt;Swine Flu&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Bill+Brenner&quot; rel=&quot;tag&quot;&gt;Bill Brenner&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/CSO&quot; rel=&quot;tag&quot;&gt;CSO&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Pandemic+Influenza+Planning&quot; rel=&quot;tag&quot;&gt;Pandemic Influenza Planning&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/WHO&quot; rel=&quot;tag&quot;&gt;WHO&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Global+Health+Emergency&quot; rel=&quot;tag&quot;&gt;Global Health Emergency&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Level+6+Pandemic&quot; rel=&quot;tag&quot;&gt;Level 6 Pandemic&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information+Security+Resources&quot; rel=&quot;tag&quot;&gt;Information Security Resources&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/www.information-security-resources.com&quot; rel=&quot;tag&quot;&gt;www.information-security-resources.com&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/06/who-declares-swine-flu-pandemic-now.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh4.ggpht.com/_9STd2plIvHE/SjG9mOLGdkI/AAAAAAAAAGM/w9lTU51BqH0/s72-c/clip_image001_thumb.jpg?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-625059903737172780</guid><pubDate>Thu, 11 Jun 2009 03:38:00 +0000</pubDate><atom:updated>2009-06-10T22:38:24.616-05:00</atom:updated><title>#links</title><description>&lt;a href=&quot;http://thedailysandbox.blogspot.com/2009/05/speculation-rumors-and-whispers-who.html#links&quot;&gt;#links&lt;/a&gt;</description><link>http://thedailysandbox.blogspot.com/2009/06/links.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-2746687411379815323</guid><pubDate>Sat, 06 Jun 2009 04:23:00 +0000</pubDate><atom:updated>2009-06-05T23:23:27.717-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">&quot;2009 Stimulus Bill&quot;</category><category domain="http://www.blogger.com/atom/ns#">2009</category><category domain="http://www.blogger.com/atom/ns#">Anderson Cooper</category><category domain="http://www.blogger.com/atom/ns#">Bill Brenner</category><category domain="http://www.blogger.com/atom/ns#">Business Continuity</category><category domain="http://www.blogger.com/atom/ns#">COBRA</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">confidential</category><category domain="http://www.blogger.com/atom/ns#">CSO Online</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Space</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">fraudulent email</category><category domain="http://www.blogger.com/atom/ns#">Global Health Emergency</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">Government</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">Icerocket</category><category domain="http://www.blogger.com/atom/ns#">ID Theft</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Kevin Nixon</category><category domain="http://www.blogger.com/atom/ns#">Pandemic Influenza Planning</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">scams</category><category domain="http://www.blogger.com/atom/ns#">Zero Day Attack</category><title>Guide to Global Leadership: Two Recommended “Must Reads” for Corporate Executives</title><description>&lt;p&gt;&lt;i&gt;By &lt;/i&gt;&lt;a href=&quot;http://information-security-resources.com/our-team/&quot;&gt;&lt;i&gt;Kevin M. Nixon&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, MSA, CISSP&lt;sup&gt;©&lt;/sup&gt;, CISM&lt;sup&gt;©&lt;/sup&gt;, CGEIT&lt;sup&gt;©&lt;/sup&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;&lt;font size=&quot;3&quot;&gt;“The Age of the Unthinkable” by &lt;/font&gt;&lt;a href=&quot;http://www.hachetteaudio.com&quot; target=&quot;_blank&quot;&gt;&lt;font size=&quot;3&quot;&gt;Joshua Cooper Ramo&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Do not pass Go! Do not collect $200!&amp;#160; Go directly online and buy “The Age of the Unthinkable” by &lt;a href=&quot;http://www.hachetteaudio.com&quot; target=&quot;_blank&quot;&gt;Joshua Cooper Ramo&lt;/a&gt;.&amp;#160; I have been telling everyone I know about this book and now I am writing about it too.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;We can all agree, that each day we hear yet another discouraging news report on how something else unexpected has gone to hell in a hand-basket.&amp;#160; Just this past November 2008, Alan Greenspan in testimony before Congress said “I’ve discovered a flaw.”&amp;#160; The Congressman questioning Mr. Greenspan asked him to explain, and with much bewilderment Mr. Greenspan said that “using the vast knowledge he had accumulated of the last 40 years and on which he had based his most trusted decisions, was no longer valid.”&amp;#160; &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Hearing that from Alan Greenspan must have had the same impact as someone overhearing Warren Buffet say “oops, I only wanted to buy 10% of that company and I accidentally added an extra zero.&amp;#160; Now I own 100%.&amp;#160; Can I change that order?”&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Here is some background on the author:&amp;#160; &lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;justify&quot;&gt;Joshua Cooper Ramo is the managing director at Kissinger Associates, one of the world’s leading geostrategic advisory firms and the former foreign editor and assistant managing editor of Time magazine.&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Mr. Ramo has recently released an audio book entitled “The Age of the Unthinkable – Why the new world disorder constantly surprises us and what we can do about it”&lt;/p&gt; &lt;/blockquote&gt;  &lt;p align=&quot;justify&quot;&gt;Here is a brief section of the book’s introduction:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;justify&quot;&gt;“Just a few years into a new century, we’ve arrived at a moment of peril that not long ago would have seemed unimaginable.&amp;#160; All around us, the ideas and institutions that we once relied on for our safety and security are failing, and the best ideas of our leaders seem to make our problems worse, not better.&amp;#160; A global war on terror produces,&amp;#160; in the end, more dangerous terrorists.&amp;#160; The fight to stop financial crisis seems to accelerate its arrival.&amp;#160; Carefully negotiated&amp;#160; peace plans produce less peace.&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;This wasn’t always the case.&amp;#160; For decades, our engagement with the world was based on the seductive belief that there was a logical relationship between the power of states and the physics of change.&amp;#160; But that traditional physics of power has been replaced by something radically different.&amp;#160; Drawing upon history, economics, complexity theory, psychology, human immunology, and the science of networks we learn about a landscape of inherent unpredictability and remarkable possibility.”&lt;/p&gt; &lt;/blockquote&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;font size=&quot;3&quot;&gt;&amp;quot;ALL I REALLY NEED TO KNOW I LEARNED IN KINDERGARTEN&amp;quot; by &lt;/font&gt;&lt;a href=&quot;http://www.robertfulghum.com/&quot; target=&quot;_blank&quot;&gt;&lt;font size=&quot;3&quot;&gt;Robert Fulghum&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Most of what we really need to know about how to live, and what to do, and how to be, we learned in kindergarten. Wisdom was not at the top of the graduate school mountain, but there in the sand box at nursery school. &lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;justify&quot;&gt;These are the things we learned. &lt;/p&gt;    &lt;ul&gt;     &lt;ul&gt;       &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Share everything. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Play fair. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Don&#39;t hit people. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Put things back where you found them. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Clean up your own mess. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Don&#39;t take things that aren&#39;t yours. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Say you are sorry when you hurt somebody. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Wash your hands before you eat. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Flush. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Warm cookies and cold milk are good for you. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Live a balanced life. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Learn some and think some and draw some and paint and sing and dance and play and work everyday. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Take a nap every afternoon. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;When you go out in the world, watch for traffic, hold hands, and stick together. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Be aware of wonder. &lt;/div&gt;       &lt;/li&gt;        &lt;li&gt;         &lt;div align=&quot;justify&quot;&gt;Remember the little seed in the plastic cup? The roots go down and the plant goes up and nobody really knows how or why. We are like that. &lt;/div&gt;       &lt;/li&gt;     &lt;/ul&gt;   &lt;/ul&gt; &lt;/blockquote&gt;  &lt;p align=&quot;justify&quot;&gt;And then remember that book about Dick and Jane and the first word you learned, the biggest word of all: LOOK! Everything you need to know is there somewhere. The Golden Rule and love and basic sanitation, ecology, and politics and the sane living. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Think of what a better world it would be if we all, the whole world, had cookies and milk about 3 o&#39;clock every afternoon and then lay down with our blankets for a nap. Or we had a basic policy in our nation and other nations to always put things back where we found them and clean up our own messes. And it is still true, no matter how old you are, when you go out in the world, it is best to hold hands and stick together. &lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;justify&quot;&gt;&lt;em&gt;Kevin M. Nixon, MSA, CISSP®, CISM®, CGEIT®, has testified as an expert witness before the Congressional High Tech Task Force, the Chairman of the Senate Armed Services Committee, and the Chairman of the House Ways and Means Committee. He has also served on infrastructure security boards and committees including the Disaster Recovery Workgroup for the Office of Homeland Security, and as a consultant to the Federal Trade Commission.&lt;/em&gt;&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;&lt;em&gt;The Author gives permission to link, post, distribute, or reference the above article for any lawful purpose, provided attribution is made to the author and to &lt;/em&gt;&lt;a href=&quot;http://Information-Security-Resources.com&quot;&gt;&lt;em&gt;Information-Security-Resources.com&lt;/em&gt;&lt;/a&gt;&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:f9c892f3-3c4c-4908-8006-a1d81abcca5d&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Anthony+M+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M Freed&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:c7182040-0a4a-425b-b51d-6ef0f6082b32&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Anthony+M+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M Freed&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:226cad07-0f1d-49a8-94f3-dbe96844fd8e&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Anthony+M+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M Freed&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:54adfda9-9be3-421e-9c6d-ce3fe153c0cb&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Anthony+M+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M Freed&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/06/guide-to-global-leadership-two.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-322638979499664671</guid><pubDate>Sun, 31 May 2009 01:36:00 +0000</pubDate><atom:updated>2009-05-30T20:36:56.844-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anderson Cooper</category><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><title>Susan Boyle 1st Runner-up &amp;#39;Britain&amp;#39;s Got Talent&amp;#39;!</title><description>&lt;p&gt;Susan Boyle Fans can email Queen Elizabeth at: &lt;a href=&quot;mailto:webeditor@royal.gsx.gov.uk&quot;&gt;webeditor@royal.gsx.gov.uk&lt;/a&gt;&amp;#160; Perhaps Ms Boyle will receive a special invitation to perform for her Majesty. &lt;/p&gt;  &lt;blockquote&gt;   &lt;p align=&quot;justify&quot;&gt;&lt;a title=&quot;May 30, 2009&quot; href=&quot;http://watching-tv.ew.com/2009/05/susan-boyle-b-2.html?xid=rss-feed-todayslatest-Susan+Boyle+loses+%27Talent%27+vote&quot;&gt;May 30, 2009&lt;/a&gt;&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;&amp;#160;&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Susan Boyle lost &lt;em&gt;Britain&#39;s Got Talent&lt;/em&gt; to the ten-person dance crew Diversity. &amp;quot;Lads, I wish you all the best,&amp;quot; said Boyle graciously. It was a stunning loss. Boyle took second place in the voting. &lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Boyle chose to sing again the song that first brought her fame, &amp;quot;I Dreamed a Dream.&amp;quot; Dressed in a blue gown and saying that this performance represented &amp;quot;forty years of doin,&#39;&amp;quot; the Scottish sensation gave this final performance:&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Given all the publicity Boyle received here in the States, it wasn&#39;t clear to many of us just how close the competition has been all along. To American eyes, the hip-hop dance-troupe Diversity looks pretty ordinary, don&#39;t you agree? But judge Simon Cowell hailed them as &amp;quot;the only act tonight I&#39;d give a &#39;10&#39; to&amp;quot; and &amp;quot;sheer and utter perfection.&amp;quot; Judge for yourself:      &lt;br /&gt;      &lt;br /&gt;&lt;/p&gt;   &lt;object width=&quot;340&quot; height=&quot;285&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube-nocookie.com/v/b2xiAQCTy2E&amp;amp;hl=en&amp;amp;fs=1&amp;amp;color1=0x006699&amp;amp;color2=0x54abd6&amp;amp;border=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube-nocookie.com/v/b2xiAQCTy2E&amp;amp;hl=en&amp;amp;fs=1&amp;amp;color1=0x006699&amp;amp;color2=0x54abd6&amp;amp;border=1&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;340&quot; height=&quot;285&quot;&gt;&lt;/embed&gt;&lt;/object&gt;    &lt;p&gt;&amp;#160;&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;Diversity will perform before the Queen Elizabeth II in the Royal Variety Show and wins 100,000 pounds (about $159,000).&lt;/p&gt;    &lt;p align=&quot;justify&quot;&gt;What do you think of the results? What do you think the future holds for Susan Boyle?&lt;/p&gt; &lt;/blockquote&gt;  &lt;p align=&quot;justify&quot;&gt;Piers Morgan&#39;s blog: &lt;a href=&quot;http://www.officialpiersmorgan.com/&quot;&gt;http://www.officialpiersmorgan.com/&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;   &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:cf8afc07-3e7f-4412-87e6-5cfd183d51ba&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=Susan+Boyle&quot; rel=&quot;tag&quot;&gt;Susan Boyle&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=1st+runner-up&quot; rel=&quot;tag&quot;&gt;1st runner-up&lt;/a&gt;&lt;/div&gt;    &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:64bb4548-6c5b-4a7f-beb9-415f1cb25110&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/Susan+Boyle&quot; rel=&quot;tag&quot;&gt;Susan Boyle&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/1st+runner-up&quot; rel=&quot;tag&quot;&gt;1st runner-up&lt;/a&gt;&lt;/div&gt;    &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:f1d1c0fe-924e-49a7-924e-2d77426e4210&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;43 Things Tags: &lt;a href=&quot;http://www.43things.com/tag/Susan+Boyle&quot; rel=&quot;tag&quot;&gt;Susan Boyle&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/1st+runner-up&quot; rel=&quot;tag&quot;&gt;1st runner-up&lt;/a&gt;&lt;/div&gt;    &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:ab67ffd8-2ab0-45bb-8e50-f86c87a544d9&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/Susan+Boyle&quot; rel=&quot;tag&quot;&gt;Susan Boyle&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/1st+runner-up&quot; rel=&quot;tag&quot;&gt;1st runner-up&lt;/a&gt;&lt;/div&gt;    &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:35518835-be75-4843-8cd7-9ffa8f519783&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/Susan+Boyle&quot; rel=&quot;tag&quot;&gt;Susan Boyle&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/1st+runner-up&quot; rel=&quot;tag&quot;&gt;1st runner-up&lt;/a&gt;&lt;/div&gt;&lt;/p&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/05/susan-boyle-1st-runner-up-got-talent.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-7689786352612215134</guid><pubDate>Sun, 31 May 2009 00:17:00 +0000</pubDate><atom:updated>2009-05-30T19:17:56.223-05:00</atom:updated><title>The Daily Sandbox!: Speculation, Rumors and Whispers - Who could become the Cyber Tsar – Will Willie Win?</title><description>&lt;a href=&quot;http://thedailysandbox.blogspot.com/2009/05/speculation-rumors-and-whispers-who.html#links&quot;&gt;The Daily Sandbox!: Speculation, Rumors and Whispers - Who could become the Cyber Tsar – Will Willie Win?&lt;/a&gt;</description><link>http://thedailysandbox.blogspot.com/2009/05/daily-sandbox-speculation-rumors-and.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-1207731787439458813</guid><pubDate>Sun, 31 May 2009 00:05:00 +0000</pubDate><atom:updated>2009-05-30T19:05:23.467-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2009</category><category domain="http://www.blogger.com/atom/ns#">Anderson Cooper</category><category domain="http://www.blogger.com/atom/ns#">Bill Brenner</category><category domain="http://www.blogger.com/atom/ns#">Business Continuity</category><category domain="http://www.blogger.com/atom/ns#">COBRA</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">confidential</category><category domain="http://www.blogger.com/atom/ns#">CSO Online</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Space</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">fraudulent email</category><category domain="http://www.blogger.com/atom/ns#">Global Health Emergency</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">Government</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">Icerocket</category><category domain="http://www.blogger.com/atom/ns#">ID Theft</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Kevin Nixon</category><category domain="http://www.blogger.com/atom/ns#">Pandemic Influenza Planning</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">scams</category><category domain="http://www.blogger.com/atom/ns#">Zero Day Attack</category><title>Speculation, Rumors and Whispers - Who could become the Cyber Tsar – Will Willie Win?</title><description>&lt;p&gt;&lt;i&gt;By &lt;/i&gt;&lt;a href=&quot;http://information-security-resources.com/our-team/&quot;&gt;&lt;i&gt;Kevin M. Nixon&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, MSA, CISSP&lt;sup&gt;©&lt;/sup&gt;, CISM&lt;sup&gt;©&lt;/sup&gt;, CGEIT&lt;sup&gt;©&lt;/sup&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Got to thinking about all of the speculation, rumors and whispers, circulating around Washington DC tonight about who is on the short list with Tsar-like skills.&amp;#160;&amp;#160;&amp;#160; &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;First, disregard all of the qualifications, in-depth security knowledge etc. that are on the typical everyday run of the mill Tsar Job Postings.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Think about alternative candidates that have additional supplemental income to take the sting out of that capitated $150K pay grade.&amp;#160; Perhaps someone retired from the military, perhaps someone who has retained top level security clearance while in the private sector.&amp;#160; Perhaps someone with experience dealing with huge software suppliers and with experience in Government Relations and Federal Programs with companies located in Washington State.&amp;#160; And certainly someone with former responsibility for sales, business development, and the capture/proposal process for public sector opportunities.&amp;#160; Consider also, someone with experience developing a company&#39;s Network Centric Systems, for Military Integration and Transformation.&amp;#160; After all of those additional qualifications, perhaps someone currently in the private sector with very close government ties.&amp;#160;&amp;#160; &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;a href=&quot;https://www.ncoic.org/news/exec_bios/&quot;&gt;&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;a href=&quot;https://www.ncoic.org/news/exec_bios/&quot;&gt;&lt;a href=&quot;https://www.ncoic.org/news/exec_bios/&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;border-right-width: 0px; margin: 5px 10px 0px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;willie&quot; border=&quot;0&quot; alt=&quot;willie&quot; align=&quot;left&quot; src=&quot;http://lh4.ggpht.com/_9STd2plIvHE/SiHJvTAdS7I/AAAAAAAAAF0/vRDrMRQf8cE/willie%5B12%5D.png?imgmax=800&quot; width=&quot;75&quot; height=&quot;111&quot; /&gt;&lt;/a&gt;Rear Admiral Robert C. “Willie” Williamson, USN&lt;/a&gt; (Ret) joined Raytheon, Network Centric Systems in March 2004. He assumed the newly created position of Director, Naval Integration and Transformation and was assigned additional responsibilities as the Director of Business Development for Integrated Communications Systems (ICS) in December 2004. Currently, Willie is the vice president of International Programs for Integrated Communications Systems (ICS).&lt;a href=&quot;http://lh6.ggpht.com/_9STd2plIvHE/SiHJvr669WI/AAAAAAAAAF4/8w2P_XUr2Q8/s1600-h/Paul%20Kurtz%5B15%5D.png&quot;&gt;&lt;img style=&quot;border-right-width: 0px; margin: 25px 15px 15px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;paul Kurtz&quot; border=&quot;0&quot; alt=&quot;paul Kurtz&quot; align=&quot;right&quot; src=&quot;http://lh4.ggpht.com/_9STd2plIvHE/SiHJv8v7NNI/AAAAAAAAAF8/RrPa8VVVA74/Paul%20Kurtz_thumb%5B6%5D.png?imgmax=800&quot; width=&quot;76&quot; height=&quot;90&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Another Washington whisper includes &lt;a href=&quot;http://www.goodharbor.net/team/kurtz.html&quot; target=&quot;_blank&quot;&gt;Paul B. Kurtz&lt;/a&gt;, a recognized cyber security and homeland security expert. He served in senior positions on the White House&#39;s National Security and Homeland Security Councils under Presidents Clinton and Bush and is currently an on-air consultant to CBS News.&amp;#160;&amp;#160; Paul Kurtz, is currently a Partner and security consultant with Arlington, Va.-based Good Harbor Consulting.&amp;#160;&amp;#160; &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;a href=&quot;http://lh4.ggpht.com/_9STd2plIvHE/SiHJwTJZd3I/AAAAAAAAAGA/YrjJ0bXVfOE/s1600-h/Roger%20Cressey%5B4%5D.png&quot;&gt;&lt;img style=&quot;border-right-width: 0px; margin: 15px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px&quot; title=&quot;Roger Cressey&quot; border=&quot;0&quot; alt=&quot;Roger Cressey&quot; align=&quot;left&quot; src=&quot;http://lh3.ggpht.com/_9STd2plIvHE/SiHJwibjSCI/AAAAAAAAAGE/qRh0gpEHYlc/Roger%20Cressey_thumb%5B2%5D.png?imgmax=800&quot; width=&quot;74&quot; height=&quot;90&quot; /&gt;&lt;/a&gt; Good Harbor Consulting Good Harbor Consulting, LLC was founded in 2002 by Good Harbor President &lt;a href=&quot;http://www.goodharbor.net/team/cressey.html&quot;&gt;Roger W. Cressey&lt;/a&gt; after he served in cyber security and counterterrorism positions in the Clinton and Bush administrations. He sought to establish a boutique consulting firm combining public and private sector knowledge and experience to develop a unique offering for government and commercial clients.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;In 2003, &lt;a href=&quot;http://www.goodharbor.net/team/clarke.html&quot;&gt;Richard A. Clarke&lt;/a&gt; joined as Chairman of the firm and &lt;a href=&quot;http://www.goodharbor.net/team/tritak.html&quot;&gt;John S. Tritak&lt;/a&gt; joined as CEO. Clarke, an internationally recognized expert on security, including homeland security, national security, cyber security, and counterterrorism, has served the last three U.S. Presidents as a senior White House advisor. Prior to his 11 consecutive White House years, Clarke served for 19 years in the Pentagon, the Intelligence Community, and State Department. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;So, President Obama has a number of players sitting on the bench and ready to play the game.&amp;#160; But something just keeps nagging me as I tried to figure out who might have the best odds in Vegas.&amp;#160; Add all of those ingredients together, stir and filtered and studied and still came up with Retired U.S. Navy Rear Admiral Robert C. &amp;quot;Willie&amp;quot; Williamson.&amp;#160; &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Just as I had noticed the mysterious change in Melissa Hathaway’s title on the White House Blog, at the moment that the President was speaking, I also noticed something very interesting, &lt;em&gt;&lt;font color=&quot;#ecc904&quot;&gt;&lt;strong&gt;“Why would Raytheon remove Rear Admiral Williamson’s distinguished service Bio from the corporate website?”&lt;/strong&gt;&lt;/font&gt;&lt;/em&gt;&amp;#160; Will Raytheon be doing an executive search for a new VP of International Programs?&amp;#160; (Just imagine job search skills would include:&amp;#160; “Successful candidate should possess Tsar like qualities and drive for advancement.)&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;It just seems to me that if one studies the subtle, nuance moves which Washington perfected and patented it would seems that Willie is the pick.&amp;#160; That is just my personal opinion and random thinking.&lt;/p&gt;  &lt;p align=&quot;left&quot;&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:4a456a5f-d514-4d24-8001-55431e8ead14&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Hathaway&quot; rel=&quot;tag&quot;&gt;Hathaway&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=%22Kevin+M+Nixon%22&quot; rel=&quot;tag&quot;&gt;&amp;quot;Kevin M Nixon&amp;quot;&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p align=&quot;left&quot;&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:97f90757-d485-4ccf-9296-589176eb0915&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Hathaway&quot; rel=&quot;tag&quot;&gt;Hathaway&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/%22Kevin+M+Nixon%22&quot; rel=&quot;tag&quot;&gt;&amp;quot;Kevin M Nixon&amp;quot;&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p align=&quot;left&quot;&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:39a03884-8ff1-42c7-b92c-f64027695288&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;LiveJournal Tags: &lt;a href=&quot;http://www.livejournal.com/interests.bml?int=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Hathaway&quot; rel=&quot;tag&quot;&gt;Hathaway&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=%22Kevin+M+Nixon%22&quot; rel=&quot;tag&quot;&gt;&amp;quot;Kevin M Nixon&amp;quot;&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:dfd6ea27-737e-454c-8cf1-7f2cf08441bb&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Hathaway&quot; rel=&quot;tag&quot;&gt;Hathaway&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/%22Kevin+M+Nixon%22&quot; rel=&quot;tag&quot;&gt;&amp;quot;Kevin M Nixon&amp;quot;&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:3f70571d-b30e-4c49-92af-3bc60a407c62&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;43 Things Tags: &lt;a href=&quot;http://www.43things.com/tag/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Hathaway&quot; rel=&quot;tag&quot;&gt;Hathaway&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/%22Kevin+M+Nixon%22&quot; rel=&quot;tag&quot;&gt;&amp;quot;Kevin M Nixon&amp;quot;&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://www.43things.com/tag/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:0f7c5895-cab6-47dd-a700-1e0ccf0bb201&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Hathaway&quot; rel=&quot;tag&quot;&gt;Hathaway&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/%22Kevin+M+Nixon%22&quot; rel=&quot;tag&quot;&gt;&amp;quot;Kevin M Nixon&amp;quot;&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/05/speculation-rumors-and-whispers-who.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh4.ggpht.com/_9STd2plIvHE/SiHJvTAdS7I/AAAAAAAAAF0/vRDrMRQf8cE/s72-c/willie%5B12%5D.png?imgmax=800" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-4613185710703257969</guid><pubDate>Sat, 30 May 2009 03:41:00 +0000</pubDate><atom:updated>2009-05-29T22:41:01.048-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">&quot;2009 Stimulus Bill&quot;</category><category domain="http://www.blogger.com/atom/ns#">2009</category><category domain="http://www.blogger.com/atom/ns#">Anderson Cooper</category><category domain="http://www.blogger.com/atom/ns#">Bill Brenner</category><category domain="http://www.blogger.com/atom/ns#">Business Continuity</category><category domain="http://www.blogger.com/atom/ns#">COBRA</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">confidential</category><category domain="http://www.blogger.com/atom/ns#">CSO Online</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Space</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">fraudulent email</category><category domain="http://www.blogger.com/atom/ns#">Global Health Emergency</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">Government</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">ID Theft</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Kevin Nixon</category><category domain="http://www.blogger.com/atom/ns#">Pandemic Influenza Planning</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">scams</category><category domain="http://www.blogger.com/atom/ns#">Zero Day Attack</category><title>Washington is Whispering</title><description>&lt;h5&gt;&lt;b&gt;Speculation, Rumors and Whispers - Who could become the Cyber Tsar&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/h5&gt;  &lt;p&gt;Got to thinking about all of the speculation, rumors and whispers, circulating around Washington DC tonight about who is on the short list with Tsar-like skills.&amp;#160;&amp;#160;&amp;#160; &lt;/p&gt;  &lt;p&gt;First, disregard all of the qualifications, in-depth security knowledge etc. that are on the typical everyday run of the mill Tsar Job Postings.&lt;/p&gt;  &lt;p&gt;Think about alternative candidates that have additional supplemental income to take the sting out of that capitated $150K pay grade.&amp;#160; Perhaps someone retired from the military, perhaps someone who has retained top level security clearance while in the private sector.&amp;#160; Perhaps someone with experience dealing with huge software suppliers and with experience in Government Relations and Federal&lt;/p&gt;  &lt;p&gt;Programs with companies located in Washington State.&amp;#160; And certainly someone with former responsibility for sales, business development, and the capture/proposal process for public sector opportunities.&amp;#160; Consider also, someone with experience developing a company&#39;s Network Centric Systems, for Military Integration and Transformation.&amp;#160; After all of those additional qualifications, perhaps someone currently in the private sector with very close government ties.&amp;#160;&amp;#160; &lt;/p&gt;  &lt;p&gt;Add all of those ingredients together, stir and filter.&amp;#160; One name comes to pops to the top of the list.&amp;#160; Wonder if &lt;a href=&quot;https://www.ncoic.org/news/exec_bios/#williamson&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;u&gt;Retired U.S. Navy Rear Admiral Robert C. &amp;quot;Willie&amp;quot; Williamson&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; is considering his time with Raytheon might be limited.&amp;#160; That is just my personal opinion and random thinking.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:a4cdf51e-351b-4b98-ab9f-566ab2a5a0c9&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Hathaway+60-Day+Report&quot; rel=&quot;tag&quot;&gt;Hathaway 60-Day Report&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/NSC&quot; rel=&quot;tag&quot;&gt;NSC&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security+Our+Digital+Future&quot; rel=&quot;tag&quot;&gt;Security Our Digital Future&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/testimony&quot; rel=&quot;tag&quot;&gt;testimony&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/USSS&quot; rel=&quot;tag&quot;&gt;USSS&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/v&quot; rel=&quot;tag&quot;&gt;v&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:48a9ad65-ebd1-406c-bc2e-055da3728672&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Hathaway+60-Day+Report&quot; rel=&quot;tag&quot;&gt;Hathaway 60-Day Report&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/NSC&quot; rel=&quot;tag&quot;&gt;NSC&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security+Our+Digital+Future&quot; rel=&quot;tag&quot;&gt;Security Our Digital Future&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/testimony&quot; rel=&quot;tag&quot;&gt;testimony&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/USSS&quot; rel=&quot;tag&quot;&gt;USSS&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/v&quot; rel=&quot;tag&quot;&gt;v&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:335cd0e1-ed77-43b7-8c74-7d197a2b1577&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Hathaway+60-Day+Report&quot; rel=&quot;tag&quot;&gt;Hathaway 60-Day Report&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=NSC&quot; rel=&quot;tag&quot;&gt;NSC&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security+Our+Digital+Future&quot; rel=&quot;tag&quot;&gt;Security Our Digital Future&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=testimony&quot; rel=&quot;tag&quot;&gt;testimony&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=USSS&quot; rel=&quot;tag&quot;&gt;USSS&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=v&quot; rel=&quot;tag&quot;&gt;v&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:347c042d-03ec-48ed-973c-eb9631605cc9&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/DHS&quot; rel=&quot;tag&quot;&gt;DHS&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Government&quot; rel=&quot;tag&quot;&gt;Government&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/hackers&quot; rel=&quot;tag&quot;&gt;hackers&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Hathaway+60-Day+Report&quot; rel=&quot;tag&quot;&gt;Hathaway 60-Day Report&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Larry+Carter&quot; rel=&quot;tag&quot;&gt;Larry Carter&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/malware&quot; rel=&quot;tag&quot;&gt;malware&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/management&quot; rel=&quot;tag&quot;&gt;management&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Melissa+Hathaway&quot; rel=&quot;tag&quot;&gt;Melissa Hathaway&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/misuse&quot; rel=&quot;tag&quot;&gt;misuse&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/NSC&quot; rel=&quot;tag&quot;&gt;NSC&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Obama&quot; rel=&quot;tag&quot;&gt;Obama&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/press+release&quot; rel=&quot;tag&quot;&gt;press release&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security+Our+Digital+Future&quot; rel=&quot;tag&quot;&gt;Security Our Digital Future&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Senate&quot; rel=&quot;tag&quot;&gt;Senate&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/software&quot; rel=&quot;tag&quot;&gt;software&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/testimony&quot; rel=&quot;tag&quot;&gt;testimony&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/USSS&quot; rel=&quot;tag&quot;&gt;USSS&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/v&quot; rel=&quot;tag&quot;&gt;v&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/White+House&quot; rel=&quot;tag&quot;&gt;White House&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/05/washington-is-whispering.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-4565968122282648252</guid><pubDate>Fri, 29 May 2009 23:49:00 +0000</pubDate><atom:updated>2009-05-29T18:49:08.836-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">&quot;2009 Stimulus Bill&quot;</category><category domain="http://www.blogger.com/atom/ns#">2009</category><category domain="http://www.blogger.com/atom/ns#">Anderson Cooper</category><category domain="http://www.blogger.com/atom/ns#">Bill Brenner</category><category domain="http://www.blogger.com/atom/ns#">Business Continuity</category><category domain="http://www.blogger.com/atom/ns#">COBRA</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">confidential</category><category domain="http://www.blogger.com/atom/ns#">CSO Online</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Space</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">fraudulent email</category><category domain="http://www.blogger.com/atom/ns#">Global Health Emergency</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">Government</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">ID Theft</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Kevin Nixon</category><category domain="http://www.blogger.com/atom/ns#">Pandemic Influenza Planning</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">scams</category><category domain="http://www.blogger.com/atom/ns#">Zero Day Attack</category><title>Is she or isn’t she – America’s New Cybersecurity Tsarina?</title><description>&lt;p&gt;&lt;i&gt;By &lt;/i&gt;&lt;a href=&quot;http://information-security-resources.com/our-team/&quot;&gt;&lt;i&gt;Kevin M. Nixon&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, MSA, CISSP&lt;sup&gt;©&lt;/sup&gt;, CISM&lt;sup&gt;©&lt;/sup&gt;, CGEIT&lt;sup&gt;©&lt;/sup&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Information Security Resources staff had received an advance copy of the official &lt;a href=&quot;http://information-security-resources.com/2009/05/29/white-house-cyberspace-policy-review/&quot;&gt;White House Press Release (05/29/2009)&lt;/a&gt; and was all ears today during President Obama’s East Room remarks on the highly anticipated and long awaited release of the “&lt;i&gt;Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure&lt;/i&gt;”. The report has become known as “The Hathaway 60-Day Report” in “&lt;i&gt;homage&lt;/i&gt;” to Melissa Hathaway, the person President Obama picked as “&lt;i&gt;Acting Senior Director &lt;/i&gt;&lt;i&gt;for Cyberspace of the National Security Council (NSC) and the Homeland Security Council (HSC)&lt;/i&gt;”. Not only did the President bestow a title too long to technically print on a normal sized business card, also he gave her a the shortest runway I have ever seen to assemble recommendations, gain consensus, and publish a report for the Chief Executive. Just pulling together all agencies, departments, stove-piped information while overcoming all the turf battles can only be likened to attempting a huge worm wrestle.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Ms Hathaway accomplished the task and delivered the goods and so everyone anticipated that the President would recognize her “get it done” work ethic and also announce from the East Room today, her appointment as America’s Cybersecurity Tsarina. However, everyone holding their breath in the East Room today probably passed out from lack of oxygen. The President was blatantly and conspicuously silent on his appointment.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;The President’s silence left everyone wondering “does she or doesn’t she” and left reports attempting to find any hints of the President’s plan. ISR think that we may be on to something. As POTUS stepped in front of the gathered experts, somewhere in the back offices of the White House there was a shadowy figure hunkered over a keyboard waiting for the exact moment to press enter and publish an article on the White House Blog. Could that person have even been sitting in the East Room audience with the President holding onto her three Blackberry devices just waiting for President Obama to give the secret word or phrase to “press the send” button?&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;We may never know, but President Obama did acknowledge Melissa Hathaway at about the same time that an article by her was posted on the White House Blog. What is noticeable is in Ms Hathaway’s article is her title in the article’s by-line. Gone is “&lt;i&gt;Melissa&lt;/i&gt;&lt;i&gt; Hathaway&lt;/i&gt;&lt;i&gt;, Acting Senior Director &lt;/i&gt;&lt;i&gt;for Cyberspace of the National Security Council (NSC) and the Homeland Security Council (HSC)&lt;/i&gt;”. The new by-line reads: &lt;b&gt;&lt;i&gt;Melissa&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt; Hathaway&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;, Cybersecurity Chief at the National Security Council&lt;/i&gt;&lt;/b&gt;&lt;b&gt;. &lt;/b&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Which still leaves us wondering and waiting? Is the White House making new robes as the Catholic church does when a new Pope is elected or has Ms Hathaway been appointed “Camerlingo” (1&lt;sup&gt;st&lt;/sup&gt; runner up in a papal contest). Guess we will just have to wait. Melissa Hathaway’s Blog post “Security Our Digital Future” is re-published on the ISR website.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;   &lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://www.whitehouse.gov/CyberReview/&quot;&gt;Securing Our Digital Future&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;b&gt;&lt;i&gt;Melissa Hathaway, Cybersecurity Chief at the National Security Council,&lt;/i&gt;&lt;/b&gt;&lt;i&gt; discusses securing our nation&#39;s digital future: &lt;/i&gt;    &lt;br /&gt;&lt;/p&gt; &lt;i&gt;&lt;/i&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;i&gt;Published: FRI, MAY 29, 10:00 AM EST -- &lt;a href=&quot;http://www.whitehouse.gov/blog/&quot;&gt;The White House Blog&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;The globally-interconnected digital information and communications infrastructure known as cyberspace underpins almost every facet of modern society and provides critical support for the U.S. economy, civil infrastructure, public safety and national security.&amp;#160; The United States is one of the global leaders on embedding technology into our daily lives and this technology adoption has transformed the global economy and connected people in ways never imagined.&amp;#160; My boys are 8 and 9 and use the Internet daily to do homework, blog with their friends and teacher, and email their mom; it is second nature to them.&amp;#160; My mom and dad can read the newspapers about their daughter on-line and can reach me anywhere in the world from their cell phone to mine.&amp;#160; And people all over the world can post and watch videos and read our blogs within minutes of completion.&amp;#160; I can’t imagine my world without this connectivity and I would bet that you cannot either.&amp;#160;&amp;#160; Now consider that the same networks that provide this connectively also increasingly help control our critical infrastructure.&amp;#160; These networks deliver power and water to our households and businesses, they enable us to access our bank accounts from almost any city in the world, and they are transforming the way our doctors provide healthcare.&amp;#160; For all of these reasons, we need a safe Internet with a strong network infrastructure and we as a nation need to take prompt action to protect cyberspace for what we use it for today and will need in the future. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Protecting cyberspace requires strong vision and leadership and will require changes in policy, technology, education, and perhaps law.&amp;#160; The &lt;a href=&quot;http://www.whitehouse.gov/asset.aspx?AssetId=1732&quot;&gt;60-day cyberspace policy review&lt;/a&gt; summarizes our conclusions and outlines the beginning of a way forward in building a reliable, resilient, trustworthy digital infrastructure for the future.&amp;#160; There are opportunities for everyone—individuals, academia, industry, and governments—to contribute toward this vision.&amp;#160; During the review we engaged in more than 40 meetings and received and read &lt;a href=&quot;http://www.whitehouse.gov/cyberreview/documents&quot;&gt;more than 100 papers that informed our recommendations&lt;/a&gt;.&amp;#160;&amp;#160; As you will see in our review there is a lot of work for us to do together and an ambitious action plan to accomplish our goals.&amp;#160; It must begin with a national dialogue on cybersecurity and we should start with our family, friends, and colleagues. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;We are late in addressing this critical national need and our response must be focused, aggressive, and well-resourced.&amp;#160; We have garnered great momentum in the last few months, and the vision developed in our review is based on the important input we received from industry, academia, the civil liberties and privacy communities, others in the Executive Branch, State governments, Congress, and our international partners.&amp;#160; We now have a strong and common view of what is needed to achieve change.&amp;#160;&amp;#160; Ensuring that cyberspace is sufficiently resilient and trustworthy to support U.S. goals of economic growth, civil liberties and privacy protections, national security, and the continued advancement of democratic institutions requires making cybersecurity a national priority.&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:b455e2ca-2b24-4c69-8c2b-8b85d672e8eb&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:8a06c644-9bba-4bb3-90b4-b5083b1232ce&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;LiveJournal Tags: &lt;a href=&quot;http://www.livejournal.com/interests.bml?int=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:e1bad758-3601-490c-b264-52f8020462a2&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:38fe06d3-97fa-484c-982d-312b004e87cc&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:e9785b57-0e89-423d-8fb4-a5f50c177b97&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/05/is-she-or-isnt-she-americas-new.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6535114968080307602.post-6221853022194949401</guid><pubDate>Fri, 29 May 2009 23:47:00 +0000</pubDate><atom:updated>2009-05-29T18:47:31.272-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">&quot;2009 Stimulus Bill&quot;</category><category domain="http://www.blogger.com/atom/ns#">2009</category><category domain="http://www.blogger.com/atom/ns#">Anderson Cooper</category><category domain="http://www.blogger.com/atom/ns#">Bill Brenner</category><category domain="http://www.blogger.com/atom/ns#">Business Continuity</category><category domain="http://www.blogger.com/atom/ns#">COBRA</category><category domain="http://www.blogger.com/atom/ns#">Compliance</category><category domain="http://www.blogger.com/atom/ns#">confidential</category><category domain="http://www.blogger.com/atom/ns#">CSO Online</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Cyber-Space</category><category domain="http://www.blogger.com/atom/ns#">data privacy</category><category domain="http://www.blogger.com/atom/ns#">Data Theft</category><category domain="http://www.blogger.com/atom/ns#">Economy: Problems</category><category domain="http://www.blogger.com/atom/ns#">Emergency Response Plannng</category><category domain="http://www.blogger.com/atom/ns#">fraudulent email</category><category domain="http://www.blogger.com/atom/ns#">Global Health Emergency</category><category domain="http://www.blogger.com/atom/ns#">Governance</category><category domain="http://www.blogger.com/atom/ns#">Government</category><category domain="http://www.blogger.com/atom/ns#">GRC</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">ID Theft</category><category domain="http://www.blogger.com/atom/ns#">Kevin M Nixon</category><category domain="http://www.blogger.com/atom/ns#">Kevin Nixon</category><category domain="http://www.blogger.com/atom/ns#">Pandemic Influenza Planning</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Public Policy</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">scams</category><category domain="http://www.blogger.com/atom/ns#">Zero Day Attack</category><title>THE WHITE HOUSE - Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure</title><description>&lt;p&gt;&lt;a href=&quot;http://www.whitehouse.gov/the_press_office/Cybersecurity-event-fact-sheet-and-expected-attendees/&quot;&gt;Office of the Press Secretary&lt;/a&gt;     &lt;br /&gt;_____________________________________________     &lt;br /&gt;FOR IMMEDIATE RELEASE&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; May 29, 2009&lt;/p&gt;  &lt;p&gt;Below is a fact sheet and list of expected attendees at today’s event:&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&lt;b&gt;FACT&lt;/b&gt;&lt;b&gt; SHEET      &lt;br /&gt;&lt;/b&gt;In February 2009, President Obama directed the National Security Council (NSC) and Homeland Security Council to conduct a 60-day review of the plans, programs, and activities underway throughout government that address our communications and information infrastructure (i.e., &amp;quot;cyberspace&amp;quot;), in order to develop a strategic framework to ensure that the U.S. government’s initiatives in this area are appropriately integrated, resourced, and coordinated.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;Threats to the information and communications infrastructure pose one of the most serious economic and national security challenges of the 21st Century for the United States and our allies.&amp;#160; In this environment, the status quo is no longer acceptable, and a national dialogue on cybersecurity must begin today.&amp;#160; The U.S. Government cannot succeed in securing cyberspace in isolation, but it also cannot entirely delegate or abrogate its role in securing the Nation from a cyber incident or accident.&amp;#160; Ensuring that cyberspace is sufficiently resilient and trustworthy to support U.S. goals of economic growth, civil liberties and privacy protections, national security, and the continued advancement of global democratic institutions requires working with individuals, academia, industry, and governments.&amp;#160; We must make cybersecurity a national priority and lead from the White House. &lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;The review team’s report to the President contains five main chapters, outlined below, and includes a near-term action plan for U.S. Government activities to strengthen cybersecurity.&lt;/p&gt;  &lt;p align=&quot;justify&quot;&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; (U) &lt;b&gt;&lt;i&gt;Chapter I: Leading from the Top &lt;/i&gt;&lt;/b&gt;– Makes the case for strengthening cybersecurity&amp;#160;&amp;#160;&amp;#160; leadership for the United States through 1) the establishment of a Presidential cybersecurity policy official and supporting structures, 2) reviewing laws and policies, and 3) strengthening cybersecurity leadership and accountability at federal, state, local, and tribal levels.     &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; (U) &lt;b&gt;&lt;i&gt;Chapter II: Building Capacity for a Digital Nation &lt;/i&gt;&lt;/b&gt;– Advocates a national dialogue on cybersecurity to increase public awareness of the threats and risks and how to reduce them.&amp;#160; Outlines the need for increased education efforts at all levels to ensure a technologically advanced workforce in cybersecurity and related areas, similar to the United States’ focus on mathematics and science education in the 1960s.&amp;#160; Identifies the need to expand and improve the federal information technology workforce and for the Federal government to facilitate programs and information sharing on cybersecurity threats, vulnerabilities, and effective practices across all levels of government and industry.     &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; (U) &lt;b&gt;&lt;i&gt;Chapter III: Sharing Responsibility for Cybersecurity &lt;/i&gt;&lt;/b&gt;– Discusses the need for improving and expanding partnerships between the Federal government and both the private sector and key U.S. allies.     &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; (U) &lt;b&gt;&lt;i&gt;Chapter IV: Creating Effective Information Sharing and Incident Response &lt;/i&gt;&lt;/b&gt;– The United States needs a comprehensive framework to facilitate coordinated responses by government, the private sector, and allies to a significant cyber incident.&amp;#160; This chapter explores elements of such a framework and suggests enhancements to information sharing mechanisms to improve incident response capabilities.     &lt;br /&gt;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160;&amp;#160; (U) &lt;b&gt;&lt;i&gt;Chapter V: Encouraging Innovation &lt;/i&gt;&lt;/b&gt;– The chapter addresses ways for the United States to harness the benefits of innovation to address cybersecurity concerns, including work with the private sector to define performance and security objectives for future infrastructure, linking research and development to infrastructure development and expanding coordination of government, industry, and academic research efforts.&amp;#160; It also addresses supply chain security and national security / emergency preparedness telecommunications efforts.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Expected attendees at today’s East Room event:&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Secretary Steven Chu, Department of Energy    &lt;br /&gt;Secretary&amp;#160; Janet Napolitano, Department of Homeland Security     &lt;br /&gt;General James Jones, National Security Advisor     &lt;br /&gt;Deputy Secretary William Lynn, Department of Defense     &lt;br /&gt;Deputy Secretary Neal Wolin, Department of Treasury     &lt;br /&gt;Lawrence Summers, Director of the National Economic Council     &lt;br /&gt;Lynne Osmus, Acting Administrator of the Federal Aviation Administration     &lt;br /&gt;Jon Wellinghoff, Chairman of the Federal Energy Regulatory Commission     &lt;br /&gt;Michael Copps, Acting Chairman of the Federal Communications Commission     &lt;br /&gt;Jon Leibowitz, Chair of the Federal Trade Commission     &lt;br /&gt;James Cartwright, Vice Chairman of the Joint Chiefs of Staff     &lt;br /&gt;Robert Mueller, Director of the Federal Bureau of Investigation     &lt;br /&gt;John P. Holdren, Director of the Office of Science and Technology     &lt;br /&gt;John Kimmons, Lieutenant-general, Director of National Intelligence Office     &lt;br /&gt;John O. Brennan, Assistant to the President for Homeland Security and Counterterrorism     &lt;br /&gt;Maryland Governor Martin O’Malley, Chair of National Governors Association, Homeland Security Committee     &lt;br /&gt;Congressman Bart Gordon     &lt;br /&gt;Congressman Peter King     &lt;br /&gt;William Pelgrin, Chair of the Multi-State Information Sharing and Analysis Center     &lt;br /&gt;Heather Hogsett, National Governors Association, Director, Public&amp;#160; Safety and Homeland Security Office of Federal Relations&lt;/p&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:d056a669-3f99-46a0-8d62-121035dd1919&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;Technorati Tags: &lt;a href=&quot;http://technorati.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://technorati.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:e142b11b-fcbc-4663-8e5d-2ddcf53632e3&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;LiveJournal Tags: &lt;a href=&quot;http://www.livejournal.com/interests.bml?int=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.livejournal.com/interests.bml?int=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:a1987f29-7e0a-4761-b7f6-59f73b32e9e6&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;del.icio.us Tags: &lt;a href=&quot;http://del.icio.us/popular/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://del.icio.us/popular/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:555c3408-acba-4fa4-b40b-21680e1b4e19&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;IceRocket Tags: &lt;a href=&quot;http://blogs.icerocket.com/search?q=2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://blogs.icerocket.com/search?q=zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  &lt;div style=&quot;padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px&quot; id=&quot;scid:0767317B-992E-4b12-91E0-4F059A8CECA8:6ed3071e-7ebb-4f13-8ad1-20759f65dbb9&quot; class=&quot;wlWriterEditableSmartContent&quot;&gt;BuzzNet Tags: &lt;a href=&quot;http://www.buzznet.com/tags/2009&quot; rel=&quot;tag&quot;&gt;2009&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/access&quot; rel=&quot;tag&quot;&gt;access&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Anthony+M.+Freed&quot; rel=&quot;tag&quot;&gt;Anthony M. Freed&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/best+practices&quot; rel=&quot;tag&quot;&gt;best practices&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/bypass&quot; rel=&quot;tag&quot;&gt;bypass&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/compliance&quot; rel=&quot;tag&quot;&gt;compliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/computer&quot; rel=&quot;tag&quot;&gt;computer&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/confidential&quot; rel=&quot;tag&quot;&gt;confidential&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/consumer+product+liability&quot; rel=&quot;tag&quot;&gt;consumer product liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/control&quot; rel=&quot;tag&quot;&gt;control&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Costs&quot; rel=&quot;tag&quot;&gt;Costs&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/criminal&quot; rel=&quot;tag&quot;&gt;criminal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber+security&quot; rel=&quot;tag&quot;&gt;cyber security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cyber-crime&quot; rel=&quot;tag&quot;&gt;cyber-crime&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/cybersecurity&quot; rel=&quot;tag&quot;&gt;cybersecurity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/D+and+O+liability&quot; rel=&quot;tag&quot;&gt;D and O liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Data&quot; rel=&quot;tag&quot;&gt;Data&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/due+diligence&quot; rel=&quot;tag&quot;&gt;due diligence&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Economy&quot; rel=&quot;tag&quot;&gt;Economy&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/electronic+database&quot; rel=&quot;tag&quot;&gt;electronic database&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Finance&quot; rel=&quot;tag&quot;&gt;Finance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial&quot; rel=&quot;tag&quot;&gt;Financial&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+Identity&quot; rel=&quot;tag&quot;&gt;Financial Identity&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Financial+InfoSec&quot; rel=&quot;tag&quot;&gt;Financial InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Gene+Kim&quot; rel=&quot;tag&quot;&gt;Gene Kim&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/governance&quot; rel=&quot;tag&quot;&gt;governance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infoduciary&quot; rel=&quot;tag&quot;&gt;Infoduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Infofiduciary&quot; rel=&quot;tag&quot;&gt;Infofiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information&quot; rel=&quot;tag&quot;&gt;Information&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information+Fiduciary&quot; rel=&quot;tag&quot;&gt;Information Fiduciary&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Information-Security-Resources.com&quot; rel=&quot;tag&quot;&gt;Information-Security-Resources.com&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/InfoSec&quot; rel=&quot;tag&quot;&gt;InfoSec&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/infrastructure&quot; rel=&quot;tag&quot;&gt;infrastructure&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Internet+Security+Alliance&quot; rel=&quot;tag&quot;&gt;Internet Security Alliance&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Intrusion+Detection+Engines&quot; rel=&quot;tag&quot;&gt;Intrusion Detection Engines&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/ISR&quot; rel=&quot;tag&quot;&gt;ISR&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Kevin+M.+Nixon&quot; rel=&quot;tag&quot;&gt;Kevin M. Nixon&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Laura+Wilson&quot; rel=&quot;tag&quot;&gt;Laura Wilson&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/law&quot; rel=&quot;tag&quot;&gt;law&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/legal&quot; rel=&quot;tag&quot;&gt;legal&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/liability&quot; rel=&quot;tag&quot;&gt;liability&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/mandates&quot; rel=&quot;tag&quot;&gt;mandates&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/national+security&quot; rel=&quot;tag&quot;&gt;national security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/News&quot; rel=&quot;tag&quot;&gt;News&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/outsourcing&quot; rel=&quot;tag&quot;&gt;outsourcing&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/privacy+rights&quot; rel=&quot;tag&quot;&gt;privacy rights&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/protocol&quot; rel=&quot;tag&quot;&gt;protocol&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulations&quot; rel=&quot;tag&quot;&gt;regulations&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/regulatory&quot; rel=&quot;tag&quot;&gt;regulatory&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/risk&quot; rel=&quot;tag&quot;&gt;risk&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Sarbanes-Oxley&quot; rel=&quot;tag&quot;&gt;Sarbanes-Oxley&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Security&quot; rel=&quot;tag&quot;&gt;Security&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/SOX&quot; rel=&quot;tag&quot;&gt;SOX&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/statutes&quot; rel=&quot;tag&quot;&gt;statutes&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/System&quot; rel=&quot;tag&quot;&gt;System&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/systems&quot; rel=&quot;tag&quot;&gt;systems&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/third+party&quot; rel=&quot;tag&quot;&gt;third party&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/Tripwire&quot; rel=&quot;tag&quot;&gt;Tripwire&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/valuation&quot; rel=&quot;tag&quot;&gt;valuation&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/vendors&quot; rel=&quot;tag&quot;&gt;vendors&lt;/a&gt;,&lt;a href=&quot;http://www.buzznet.com/tags/zero+day+attack&quot; rel=&quot;tag&quot;&gt;zero day attack&lt;/a&gt;&lt;/div&gt;  </description><link>http://thedailysandbox.blogspot.com/2009/05/white-house-cyberspace-policy-review.html</link><author>noreply@blogger.com (Kevin M Nixon (aka, Sandman))</author><thr:total>0</thr:total></item></channel></rss>