Category: News

Done Something Illegal? Swap Out Your Finger Prints!

fingerAccording to this article, a Chinese woman has managed to enter Japan illegally by having plastic surgery to alter her fingerprints. From the article:

Lin Rong, 27, had previously been deported from Japan for overstaying her visa. She was only discovered when she was arrested on separate charges.

Tokyo police said she had paid $15,000 (£9,000) to have the surgery in China.

It is Japan’s first case of alleged biometric fraud, but police believe the practice may be widespread.

At around $15,000 the price doesn’t feel that high when compared to the potential for being caught for a serious crime. Perhaps fingerprint-based biometric scanning is dead?

Peer2Peer Session at RSA Conference 2010 – Selecting the Right SIEM Solution

rsaMy Peer2Peer Session submission on “Selecting the Right SIEM Solution” has been accepted at RSA Conference 2010. I’m really excited for the opportunity to hear how people are implementing SIEM solutions and what tips they can share with me and their peers on how to “do SIEM” correctly. Here are the details:

Session Track: Peer2Peer
Session Code: P2P-107B
Scheduled Date: 3/2/2010
Scheduled Time: 3:40 PM – 4:30 PM
P2P Session Title: Selecting the Right SIEM Solution

Hopefully I’ll see you there 🙂

The Return of Koteas Corporation

Many of you know that I used to do information security consulting work in an after-hours capacity but moving to Bermuda forced me to close shop and stop taking on new work. Now that I’m back in Canada, and in a role where my consulting is not a conflict of interest, I’m reviving Koteas Corporation so that my business partners and I can pick up where we left off. My partners and I have years of experience in information system security and can assist your organization with:

  • Information Security Program Development
  • Secure Network Design and Support
  • Incident Handling
  • Forensic Response, Analysis, and Recovery
  • Litigation Support
  • Penetration Testing and Vulnerability Assessment
  • Security Incident and Event Management (SIEM) Research, Design, and Implementation
  • Log Management (LM) Research, Design, and Implementation
  • Security and Compliance Auditing
  • Training and Documentation Development

Please contact me for more information or to discuss any projects you may require assistance with.

koteas

Scroll to top