Is it time for enterprises to start thinking about TEMPEST?

Truly innovative attacks are hard to come by. Every so often an old trick implemented in a new way may be counted as innovative. In 2011 the issue of using mobile phones to collect the vibrations from keyboards was discussed (http://dl.acm.org/citation.cfm?doid=2046707.2046771). In 2009 even t-shirts and teacups were discussed as possible surfaces on which a signal could be bounced […]

“Mitigating IT Compliance gaps” or “Compliance is not security”

We have all heard that compliance is not synonym to IT Security although that is true for any compliance body out there; what does it mean for your company, and how should you go about tackling the remediation project? Lately we noticed a lot of companies starting multiyear compliance centric projects. Unfortunately too many of […]