tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Current Articles | RSS Feed RSS Feed

IT Security Crucial to Mobile Device Management, says NIST

IT Managed Security

According to a recent draft of mobile security guidance from the National Institute of Standards and Technology (NIST), businesses should seriously consider the deployment of software that can provide centralized management for mobile devices.  This recommendation appears in "Guidelines for Managing and Securing Mobile Devices in the Enterprise," also known as Revision 1 of NIST Special Publication 800-124.  The draft guidance goes beyond a mere recommendation of such IT solutions; it also provides detailed suggestions that SMBs can use to help them select a centralized management program for mobile devices, as well as guidance with regard to installing and using such a system.

Is Social Media Destroying Your IT Governance Framework?

Social Media IT Governance Concerns

As a business or as an individual, you may already have IT governance concerns about the amount of information available online about you. Many of the most high profile hacking cases in the news in recent years have not come about through complex network reconfiguration, but rather through using information freely available online and accessible through social networking.

Is Network Security Worthless?

Network Security

In today’s world of free data exchange, it is an interesting thought to be addressed on whether network security really hold the importance as it used to be a few years earlier? But this is of great priority for corporate management and top level management to have a better understanding of the real need for professionally-managed network security.

Google Enforces IT Security Policies Due to MP3 Ripping Sites

IT security

In previous years, the primary means of obtaining copyrighted music illegally was peer to peer file sharing networks such as Gnutella, KaZaA, Napster, BearShare, WinMX and eDonkey. With the inception of the YouTube video sharing service, which is owned by Google, these peer to peer services have largely fallen into disuse in favor of Adobe Flash-based multimedia sharing services. YouTube gives its enormous user base the ability to upload any video or audio they wish. Though many uses of this technology are legitimate, others reproduce copyright holders' content without permission. This phenomenon has been observed by IT security professionals, record labels and technology journalists worldwide.

Legal authorities at Google have taken notice of a surge in sites that automate the process of stripping the audio content out of YouTube videos, thus resulting in a downloadable MP3 file of a potentially copyrighted song. Two of these sites, and have come under intense scrutiny by IT security professionals at Google. As a result, Google has issued notices to the owners and operators of these two sites requesting that their services be discontinued. However, this does not appear to be motivated by the obvious threat of copyright infringement. Rather, Google claims that these two sites exploit the YouTube API (Application Programming Interface) in a manner that is not permitted by the EULA (End User License Agreement) and Google's privacy policies. Google claims that the activities these sites perform violate the usage rights YouTube visitors agree to by utilizing the service.

There are two means by which sites like and can operate:

1. The site requests a URL (Uniform Resource Locator, also known as a "web address") from the user. Alternately, the site may request a song or artist name in order to look up relevant YouTube videos on its own. The site's server then downloads the FLV (Adobe Flash Video container format) and extracts the audio stream within. The MP3 file containing only the music content is then served to the user.

IT Governance and the Fight Against Illegally Shared Content

IT Services and ISP

While the debate about suitable forms of governance for copyright infringement continues to evolve here in the US, European courts are also struggling to find consensus. In the last week, French and German courts have both been considering the role played by file-hosting services and ISPs in the fight against illegally shared content. They have both come to different conclusions.

5 Things About Data Protection a Compliancy Officer Doesn't Know

Compliance and Data Protection

One of the biggest problems for an officer retained to monitor compliance with data protection law is that, unlike the European Union, there is no overarching government regulation. Instead, the United States takes a piecemeal approach that relies on regulation, self-regulation and legislation written to address specific issues such as the Fair Credit Reporting Act.

Cloud Computing Strategy Revealed by Department of Defense

Cloud Solutions

The Department of Defense has recently launched their new 4-step cloud computing strategy and appointed the Defense Information Systems Agency (DISA) as the dedicated broker who will oversee all purchases and ensure that the operation is safe, productive, on track and well maintained. Despite the size of the operation and the huge investments that it will call for, the department is looking to take advantage of the new and cutting edge technology developments that will enable them to enhance their cloud storage capabilities. The Department, through the 25 Point Implementation Plan to Reform Federal IT Management, aims to increase their effectiveness, productivity and efficiency and also maintain a workforce of highly skilled IT professionals who will keep the IT cloud storage and other solution up to date.

Public and Private Equanimity

What the private sector has known and has been effectively implementing is now also becoming a government initiative to boost up the security and effectiveness of the way IT is managed. The Department of Defense is now looking to partner with and learn from the measures that have already been successfully been implemented by many companies in the private sector. Through the analyses of the system and the market and technology, 4 basic steps have been identified by the Department of Defense to implement the new cloud storage strategy:

Encryption Helps to Protect Social Security Numbers


It has come to the attention of information security analysts that the state of Texas had a major security breach earlier this month.  Fortunately, the state's consistent use of encryption technology meant that the worst consequences of such a breach were avoided.

All Posts