- Eugene, Oregon, USA
- February 17
- Editor - Director of Business Development
- Infosec Island Network
- Anthony is a researcher, analyst and freelance writer living in beautiful Eugene, Oregon. Anthony founded Information-Security-Resources.com in 2008, and merged forces with the Infosec Island Network in January of 2010.
Infosec Island is committed to serving the needs of SMBs and mid-market enterprises across many industries, as well as nonprofits, government agencies, educational organizations, and the infosec community at large.
Contact Anthony at email@example.com regarding all aspects of business development, client and community relations. Many opportunities are currently available for business and strategic alignment at Infosec Island.
Anthony also writes about the finance industry - particularly information security related topics - and is a fervent advocate of both freedom and accountability.
Prior to founding ISR, Anthony received notoriety as a financial and business freelance journalist, including having numerous articles published by leading media syndicates such as The Chicago Sun-Times, Business Week’s Business Exchange, Seeking Alpha, InvestorCentric, OpenSalon, Bear Market Investments, Alacra Pulse, ML-Implode, Reuters, and dozens more.
Anthony has worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.
MY RECENT POSTS
- Extensive User and Group
August 16, 2010 11:55AM
- How to Do Application Logging
August 16, 2010 03:32AM
- Hacking Forensic Security
channel update July
August 16, 2010 03:00AM
- Cloud Delivered Security –
Solutions for Your Business
August 15, 2010 02:07PM
- Conducting After Hours
August 15, 2010 12:40PM
MY RECENT COMMENTS
- “Snoreville - Some truths
July 27, 2010 05:18PM
- “Gordon - I guess they
don't call them hackers
July 26, 2010 06:38PM
- “I think we are all
firmly in your camp, Richard.
In an email
from my associate
July 09, 2010 02:45PM
- “Thanks Token - we post
July 08, 2010 12:48PM
- “White Hat hackers like
thi author spend considerable
June 14, 2010 02:27AM
Anthony M. Freed's Links
- MY LINKS
Article by Alex Rothacker
Application Security, Inc.'s Team SHATTER (Security Heuristics of Application Testing Technology for Enterprise Research) has researched the Top 10 Database Vulnerabilities in order to provide you with the most up-to-date vulnerabilities, risk and remediation informatio… Read full post »
This was crossposted from christiaan008.blogspot.com, a blog about the youtube channel Hacking Forensic Security
First off thanks to all the subscribers, the channel has over 700 subscribers. The channel is growing steady.
This time I'll start with a couple of ideas I have for the chann… Read full post »
The rapid growth of cloud computing has encouraged security companies to develop security solutions that can be delivered in the cloud, but some aspects of security have to be delivered on-site in order for businesses to remain fully protected from internet threats.
At night things seem very different. I enjoy going outside
after the sun has completely set dark. You hear sounds you
never hear in the daytime. You see things you never see or
notice during daylight. It’s not much different within
In 1990 when I was an int… Read full post »
The steady drumbeat of FCPA enforcement continues -- now the pharma and medical device industries are on the target list, and tobacco companies recently reached plea agreements with the government.
The enforcement horizon looks like more of the same -- companies hope to escape the enforcement e… Read full post »
For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so.
The four seasons provide various opportunities for scams. Summer's “hottest&rdq… Read full post »
Article by Ashesh Mamidi
Small businesses today have shifted from paper records to electronically stored information. This so-called digitalization process has helped small businesses attain a dramatically more efficient way of doing business.
On the other hand, this has also opened new doors fo… Read full post »
Being at the helm of product development for nearly two decades in the company, Roland Slee, Vice President, Oracle Database Product Management Team, in conversation with Rahul Neel Mani, thinks it is about time the industry reconsiders the way it computes....Q:Do you think the computing will be done… Read full post »
A USB key containing hundreds of Ontario patient health information files was stolen almost two weeks ago. According to the CBC, the USB wasn't encrypted and was stolen from the purse of a University Hospital Network (UHN) employee.
The theft of these files has resulted in a call for efforts to… Read full post »
Not so long ago – when a company (business unit, department, or manager) wanted to develop a line of business software application, they would do a system analysis starting with business requirements and then proceed to develop the application and deploy it.
Things have changed. Packaged sof… Read full post »
If you are a cloud computing architect, have I got news for you - NJVC, one of the largest IT solutions providers supporting the U.S. Department of Defense (DoD), is building a high performance cloud computing team.
We help customers solve their toughest mission-critical IT challenges, enabling th… Read full post »
Employees are a company’s best source of information about what is going on in the company. It is certainly a best practice for a company to listen to its own employees, particularly to help improve its processes and procedures.
But more than listening to its employees, a… Read full post »
Tire pressure monitoring systems have been required on new cars beginning 2008 due to the defective Firestone tire debacle that occurred in 2000.
The tire pressure monitoring systems are based on battery-powered radio frequency identification (RFID) tags affixed to each tire. An electroni… Read full post »
2.0 Security Standards and Certifications
This is the second installment of six part series on IT Security History and Architecture (Part One).
Another big issue is certification. Because the need for security is so evident and the lack of security is so prevalent, various standards and… Read full post »
Israel sees electronic warfare as an alternative to F-35s
There are a few interesting items in a recent issue of Aviation Week and Space Technology. Apparently Israel is rethinking their original plan to purchase 100 of the advanced Joint Strike Fighter. With a focus on modern warfare and… Read full post »
With the signing of the Healthcare Reform Bill, new and significant compliance requirements must be met by the pharmaceutical, biological, and device industries.
In the current enforcement environment, healthcare businesses must take a proactive compliance approach or risk significant costs in… Read full post »
With 20+ million iPhones on the market there is a good chance you have one. According to San Francisco police, the 31-year-old city resident rode a bicycle up to a woman and snatched an iPhone out of her hands, and then pedaled away.
Problem was, the woman was carrying the phone… Read full post »
I set up an account on Facebook recently just to see where things are with the social networking site since the last time I checked.
There have been some changes. The porn and sex come-ons no longer populate my “Wall” and there are more controls for who… Read full post »
With the increase in cyber war incidents, and more and more complicated network environments, it is harder today to monitor and analyze networks in real time.
Enterprise Digital Rights Management by Eric Quellet is a must read paper for any organisation that is considering Enterprise Rights Management.
It helps decision makers consider the implications of using Enterprise Rights Management to protect its intellectual property and how best to implement… Read full post »
1.1 Recent Security Issues
The past year has witnessed an amazing number of articles, reports, seminars and news stories about successful hacking attempts and the lack of data and/or network security. The GAO recently reported that:
“Despite indications that agencies have improved thei… Read full post »
Risk: A Growing And Disturbing Trend
The Washington Post and WSJ Blog both reported on a decision by the University of Virgina Housing Division to remove phones from student dorm rooms. The obvious justification for the decision is the cost associated with providing phone infrastruc… Read full post »
If you’re reading this blog, you and your family are connected to the internet; your entrée to the internet is via a laptop, desktop PC, smart-phone, or other such devices and you have one, two maybe three separate service providers.
Your connected devices allow you and your… Read full post »