Welcome to BlogNotions' IT Security Blog

The BlogNotions IT Security Blog delivers a diverse series of perspectives provided by thought leaders in the security industry. Presented by NetLine, this forum delivers compelling updates on the latest technology and software, best practices for safeguarding data, recommendations for choosing various solutions, and much more. Here you can find helpful information, ask questions, and collaborate freely.

Brando’s Rules for Success

The world through a lens Project 365(2) Day 356, by Keith Williamson I’ve had a few folks ask me if I could attribute any big life lessons that have helped me get to where I am. Things like the Golden Rule or an extremely healthy amount of respect for karma (both of which would be […]

Continue Reading

No Need to Sign

Pen computing on the Palm Zire, by ilamont.com If you went shopping on Sunday and happened to notice that a signature was not required for your credit card purchase, that wasn’t an April Fools joke. Back in December & January, the major payment networks all announced they were dropping the signature requirement. Even MORE time […]

Continue Reading

So You Want to Gong-Fu?

Gong-Fu with the squid! The Gong-fu Tea Ceremony is a storied traditional method for brewing and enjoying tea (here’s another instructional video). When you start to spend money on higher quality leaf, the gong-fu tea ceremony will yield better results for a more immersive and enjoyable tea experience. Even lower quality tea can taste much […]

Continue Reading

Updated Tea Journey post

Tea-tasting, by Terry Madeley It’s been over a year since I blogged about my tea journey so far, and a LOT has happened in the past year. I’ve learned so much more and expanded my tea tastes substantially. I hope that my crazy love for tea rubs off on you guys and you can enjoy […]

Continue Reading

What’s the craic on KRACK?

For those who are not familiar with the Irish slang, read this. We got another fun named vulnerability this week that goes after WPA2 encryption, something that is ubiquitous but not impenetrable. Key Reinstallation Attacks, or KRACK for short, exposes a weakness in the WPA2 protocol. It’s an attack on the protocol itself, so anything […]

Continue Reading

Why PCI DSS 4.0 Needs to be a Complete Rewrite

The last month has been tough for our coastal regions and based on what forecasts show for the rest of the season, we’re not out of the woods. If you have not donated to those affected by these massive storms, please consider doing so today. The group that received my donations this time around is Direct […]

Continue Reading

Equifax is only half the problem, your SSN needs a redesign!

The Social Security Number in the United States is the closest thing we have to a national identification system. It’s widely used to deal with the government, open lines of credit, and serves as the unique ID for a tax payer. It’s effectively your financial and governmental digital footprint identifier from which all actions are compared. […]

Continue Reading

Orfei Steps Down

Doctor Tom Saves the Day, by Murray Barnes In a rather surprise announcement, admittedly from a guy who is farther and farther removed from the PCI DSS ecosystem with each passing day, The PCI Council announced that Steven Orfei is stepping down as GM. His tenure was rather brief, in comparison to Russo, but it’s […]

Continue Reading

Blockchain Fun

Please Pay Here 3-14-09 19, by stevendepolo Two posts in one week? What is this, 2009? I’ve always been interested in payment and commerce. Blockchain and crypto-currencies have really captured my attention lately as the business applications are many and game-changing. I just published an article on the topic in this month’s Tactics & Preparedness that […]

Continue Reading