<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Verbigena</title>
	<atom:link href="http://www.verbigena.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.verbigena.com</link>
	<description>Maximizing Value. Enhancing Worth</description>
	<lastBuildDate>Mon, 04 May 2015 11:05:31 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.2.1</generator>
	<item>
		<title>Why Security Pros Need to Prepare Now</title>
		<link>http://www.verbigena.com/uncategorized/why-security-pros-need-to-prepare-now/</link>
		<comments>http://www.verbigena.com/uncategorized/why-security-pros-need-to-prepare-now/#comments</comments>
		<pubDate>Thu, 30 Apr 2015 15:32:38 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.verbigena.com/?p=1986</guid>
		<description><![CDATA[Have you ever heard of the Cullinan diamond? If you haven&#8217;t, it was the largest diamond ever discovered: a 3106 carat diamond found in 1905 in South Africa. What&#8217;s interesting about the Cullinan diamond (at least to me) isn&#8217;t so much the discovery of the stone itself but what happened afterward: specifically, the cutting of [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Have you ever heard of the Cullinan diamond? If you haven&#8217;t, it was the largest diamond ever discovered: a 3106 carat diamond found in 1905 in South Africa. What&#8217;s interesting about the Cullinan diamond (at least to me) isn&#8217;t so much the discovery of the stone itself but what happened afterward: specifically, the cutting of the diamond.</p>
<p>The Cullinan diamond was split into a number of smaller pieces &#8212; nine large pieces and dozens of smaller ones &#8212; by Joseph Asscher, a noted diamond cutter of the time. The story goes that the cutting of the diamond required six months of preparation and study, and that the first attempt actually caused the blade he was using to shatter. After more preparation, he attempted a second strike and sealed the deal, actually fainting with exhaustion and stress once the deed was accomplished.</p>
<p>The reason I&#8217;m bringing this up is that it&#8217;s a pretty good metaphor for what can sometimes happen in security: Diamond is one of the hardest materials on Earth, right? Yet if hit in exactly the right place with the right amount of force, it will splinter, like so much glass. Understanding ahead of time not only that it will splinter but exactly where and how is not only possible &#8212; it&#8217;s a necessary part of the diamond-cutting process. It&#8217;s arguably the primary skill that separates a skilled diamond cutter from an unskilled one.</p>
<p>Security programs are very similar in some respects. There are weak areas that any security program will have &#8212; this is true universally, even though the specifics vary from program to program and company to company. Like a diamond cutter, our ability to do our job well rests in part on understanding where those weak spots are, and being alert for the specific situations that will press against them.</p>
<p>This is one reason why it&#8217;s so important for security pros to pay attention to the Internet of Things. IoT represents an area of pressure &#8212; and the adoption dynamics are such that they may apply that pressure directly against a known weak point in many security programs. Understanding why this is the case &#8212; and preparing for it now &#8212; can make quite a bit of difference down the road.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.verbigena.com/uncategorized/why-security-pros-need-to-prepare-now/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>FTC Upgrades IT to Protect Consumer Privacy, Data Security</title>
		<link>http://www.verbigena.com/design/data-security/</link>
		<comments>http://www.verbigena.com/design/data-security/#comments</comments>
		<pubDate>Tue, 28 Apr 2015 18:44:28 +0000</pubDate>
		<dc:creator><![CDATA[tansh]]></dc:creator>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[link]]></category>

		<guid isPermaLink="false">http://wordpress.tanshcreative.com/grepfrut/?p=529</guid>
		<description><![CDATA[The U.S. Federal Trade Commission, which is at the forefront of regulating the impact of information technology on consumers, is bolstering its technical resource capabilities through a new Office of Technology Research and Investigation, or OTRI. The FTC&#8217;s significant and growing role in data security and privacy protection does not arise from any direct national [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The U.S. Federal Trade Commission, which is at the forefront of regulating the impact of information technology on consumers, is bolstering its technical resource capabilities through a new Office of Technology Research and Investigation, or OTRI.</p>
<p><span id="more-529"></span></p>
<p>The FTC&#8217;s significant and growing role in data security and privacy protection does not arise from any direct national security and cyberintelligence aspect of IT, more properly within the scope of the Department of Homeland Security.</p>
<p>Instead, the FTC is concerned about the failure of commercial entities to make adequate disclosures or to properly address data breaches and privacy issues affecting consumers. The agency&#8217;s leverage stems from its legal obligation to investigate business fraud and similar offenses.</p>
<p>Creation of the new technology office will &#8220;ensure that consumers enjoy the benefits of technological progress without being placed at risk of deceptive and unfair practices,&#8221; said Jessica Rich, director of FTC&#8217;s Bureau of Consumer Protection.</p>
<p>The OTRI will provide expert research, investigative techniques for law enforcement, and further insights on technology issues involving all facets of the FTC&#8217;s consumer protection mission &#8212; including privacy, data security, connected cars, smart homes, algorithmic transparency, emerging payment methods, big data, and the Internet of Things.</p>
<p>The new office succeeds and will absorb operations of the existing Mobile Technology Unit, which was set up in 2011. Kristin Cohen, the current chief of the MTU, will lead the work of the OTRI.</p>
<p>&#8220;This is a natural evolution for the FTC. As technology gets more complex, and matters hinge on the use and misuse of technology, the FTC needs to be able to better judge whether organizations are doing the right thing,&#8221; said Lisa Sotto, a partner at<br />
<a href="http://www.hunton.com/" target="_blank">Hunton &amp; Williams</a>.</p>
<p>&#8220;Without a clear understanding of the technology that underpins the use of data, the FTC would not be able to carry out its mission effectively. Having more staff technologists will allow the FTC to better assess whether businesses are using technology in reasonable ways,&#8221; she told the E-Commerce Times.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.verbigena.com/design/data-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
