Monday, July 12, 2010

First Post

Greetings to all. This blog is about issues and trends in information security. You may have noticed I did not say network security, because network security is only one aspect of data protection. Information security includes everything from how you dispose of your trash, what files you open on your machine, or casual conversations you have with a stranger.

Chiefly, I want to discuss how to protect data from "extrusion" as well as the various methods of acquiring data, also known as penetration. I hope you find the information presented here useful.

No comments:

Post a Comment

Comments are moderated. It may take some time for your comment to appear should it be approved. Comments which we judge to be inflammatory or purely rhetorical without advancing the discussion may be rejected. Stay on topic and address the information presented, not the person who wrote the post or the comment.