By Kevin M. Nixon, MSA, CISSP©, CISM©, CGEIT©
Wozniak, et al Discuss Ripcord VoIP Security - Part 1 of a multi-part article: Before You LEAP – Grab the Ripcord! A discussion with IT Icons, Innovators and Visionaries Steve Wozniak, John McAfee, Alex Fielding, Ellen Hancock, Jon Callas, Phil Zimmerman, Dan Pitt, and Marc Hodosh.
This is the first time Ripcord Networks has ever agreed to an interview, talked on the record about the company and given someone a peek into personal motivations and what drives them ever forward. The Board of Directors, Executive Management and Advisors reads like the index of “Who’s Who”, all of them operate with a philosophy of “Made in America”, strict ethical compass, and mantra to “Do Some Good”. They discuss the fatal flaw in VoIP which create the ability to perform warrantless wiretaps and what they have done to lead the industry toward more trusted and secure Cyberspace. Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute , talks about the rising cost of data compromises and breaches in a study sponsored by PGP Corporation. The conversion of voice and video into data and, subject to eDiscovery and compromise of client-attorney privilege is covered by legal authority, Cynthia Marcotte Stamer, Esq., P.C., Partner, Curran Tomko Tarski, LLC. [For fun, WOZ hides some “Easter Eggs”. If readers find them, use Comments, Enter answer with your email address and there may even be a prize. If you don’t comment, you’ll never know.]
Click the Logo below for the Full article
Kevin M. Nixon, MSA, CISSP©, CISM©, CGEIT© has testified as an expert witness before the Congressional High Tech Task Force, the Chairman of the Senate Armed Services Committee, and the Chairman of the House Ways and Means Committee. He has also served on infrastructure security boards and committees including the Disaster Recovery Workgroup for the Office of Homeland Security, and as a consultant to the Federal Trade Commission.
The Author gives permission to link, post, distribute, or reference this article for any lawful purpose, provided attribution is made to the author and to Information-Security-Resources.com
Technorati Tags:
2009 Ripcord Networks,
Alex Fielding,
Steve Wozniak,
John McAfee,
Ellen Hancock,
Jon Callas,
Phil Zimmermann,
Marc Hodosh,
Kevin M Nixon,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
Cynthia Stamer,
D and O liability,
Data,
Defense in Dept,
due diligence,
E2E,
Economy,
electronic database,
End to End Encryption,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
firewall,
governance,
Government,
hackers,
ID,
identity thief,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Intrusion Detection Engines,
ISR,
Anthony M. Freed,
Laura Wilson,
law,
legal,
liability,
malware,
misuse,
national security,
News,
online fraud,
outsourcing,
parking vilation scam,
phishing,
press release,
privacy rights,
protocol,
proxy,
regulations,
regulatory,
Report,
Ripcord,
risk,
Security,
SSL,
System,
systems,
theft,
third party,
valuation,
vendors,
viruses,
VOIP,
warning,
worm signature,
zero day attack LiveJournal Tags:
2009 Ripcord Networks,
Alex Fielding,
Steve Wozniak,
John McAfee,
Ellen Hancock,
Jon Callas,
Phil Zimmermann,
Marc Hodosh,
Kevin M Nixon,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
Cynthia Stamer,
D and O liability,
Data,
Defense in Dept,
due diligence,
E2E,
Economy,
electronic database,
End to End Encryption,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
firewall,
governance,
Government,
hackers,
ID,
identity thief,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Intrusion Detection Engines,
ISR,
Anthony M. Freed,
Laura Wilson,
law,
legal,
liability,
malware,
misuse,
national security,
News,
online fraud,
outsourcing,
parking vilation scam,
phishing,
press release,
privacy rights,
protocol,
proxy,
regulations,
regulatory,
Report,
Ripcord,
risk,
Security,
SSL,
System,
systems,
theft,
third party,
valuation,
vendors,
viruses,
VOIP,
warning,
worm signature,
zero day attack del.icio.us Tags:
2009 Ripcord Networks,
Alex Fielding,
Steve Wozniak,
John McAfee,
Ellen Hancock,
Jon Callas,
Phil Zimmermann,
Marc Hodosh,
Kevin M Nixon,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
Cynthia Stamer,
D and O liability,
Data,
Defense in Dept,
due diligence,
E2E,
Economy,
electronic database,
End to End Encryption,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
firewall,
governance,
Government,
hackers,
ID,
identity thief,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Intrusion Detection Engines,
ISR,
Anthony M. Freed,
Laura Wilson,
law,
legal,
liability,
malware,
misuse,
national security,
News,
online fraud,
outsourcing,
parking vilation scam,
phishing,
press release,
privacy rights,
protocol,
proxy,
regulations,
regulatory,
Report,
Ripcord,
risk,
Security,
SSL,
System,
systems,
theft,
third party,
valuation,
vendors,
viruses,
VOIP,
warning,
worm signature,
zero day attack IceRocket Tags:
2009 Ripcord Networks,
Alex Fielding,
Steve Wozniak,
John McAfee,
Ellen Hancock,
Jon Callas,
Phil Zimmermann,
Marc Hodosh,
Kevin M Nixon,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
Cynthia Stamer,
D and O liability,
Data,
Defense in Dept,
due diligence,
E2E,
Economy,
electronic database,
End to End Encryption,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
firewall,
governance,
Government,
hackers,
ID,
identity thief,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Intrusion Detection Engines,
ISR,
Anthony M. Freed,
Laura Wilson,
law,
legal,
liability,
malware,
misuse,
national security,
News,
online fraud,
outsourcing,
parking vilation scam,
phishing,
press release,
privacy rights,
protocol,
proxy,
regulations,
regulatory,
Report,
Ripcord,
risk,
Security,
SSL,
System,
systems,
theft,
third party,
valuation,
vendors,
viruses,
VOIP,
warning,
worm signature,
zero day attack BuzzNet Tags:
2009 Ripcord Networks,
Alex Fielding,
Steve Wozniak,
John McAfee,
Ellen Hancock,
Jon Callas,
Phil Zimmermann,
Marc Hodosh,
Kevin M Nixon,
best practices,
bypass,
compliance,
computer,
confidential,
consumer product liability,
control,
Costs,
criminal,
cyber security,
cyber-crime,
cybersecurity,
Cynthia Stamer,
D and O liability,
Data,
Defense in Dept,
due diligence,
E2E,
Economy,
electronic database,
End to End Encryption,
Finance,
Financial,
Financial Identity,
Financial InfoSec,
firewall,
governance,
Government,
hackers,
ID,
identity thief,
Infoduciary,
Infofiduciary,
Information,
Information Fiduciary,
Information-Security-Resources.com,
InfoSec,
infrastructure,
Intrusion Detection Engines,
ISR,
Anthony M. Freed,
Laura Wilson,
law,
legal,
liability,
malware,
misuse,
national security,
News,
online fraud,
outsourcing,
parking vilation scam,
phishing,
press release,
privacy rights,
protocol,
proxy,
regulations,
regulatory,
Report,
Ripcord,
risk,
Security,
SSL,
System,
systems,
theft,
third party,
valuation,
vendors,
viruses,
VOIP,
warning,
worm signature,
zero day attack
No comments:
Post a Comment