Image [cc] –  顔なし 

Jane:  Have you noticed that this job has become more and more about the correct usage of IT approved technology?  I mean, years ago, I practiced law.  I worked with my clients to determine the best way to work together.  Now, I spend an inordinate amount of time trying

Several months ago I was asked by a partner to review the privacy policies and terms of service for a number of consumer cloud storage providers and to rank them according to how well they met his requirements based on firm policies, ABA missives, and a handful of other relevant opinions about client confidentiality and

In light of the recent LinkedIn password debacle, I thought I would share a password secret I’ve been using for a while now, client side password hashing. 

Password hashing takes a simple password, runs it through an algorithm and spits out a more complex password.  Stanford University researchers developed an algorithm for passwords that

Oh how I long for the days when I would boot up my IBM 8086 PC off of the dual-floppy drives and not have to answer any security questions in order to get to my word processing program. Granted, it was slow… but it was simple. It wasn’t connected to a fast Internet connection… but

In a prepared speech [PDF] to the 1st INTERPOL Information Security Conference, INTERPOL’s Secretary General, Ronald K. Noble mentioned that even a powerful law enforcement officer such as himself is not immune to hackers attempting to steal his identity. Noble commented:

Just recently INTERPOL’s Information Security Incident Response Team discovered two Facebook profiles

Computing in the Cloud (f.k.a. SaaS, Hosted Applications, ASP, Thin Client computing, etc.) is all the rage these days. And it incites a high level of emotion amongst both its supporters and detractors. Those holding back against the Cloud trend point to security of information (for lawyers this is your clients’ information) as

Bruce Schneier, the guru on security, posted on the differences in information security breaches by type of industry. Schneier is referencing a scientific study of security breaches. This study was looking to see if there were major differences in types of breaches by industry. Professional Services is one of the industries highlighted.

Looking into