All of the information, computers, processes, procedures, and the controls used to protect the information; are available and working correctly.

The so-called Twitter follower “bug”

On May 5, 2010, on an obscure website in Turkey, someone described a method that allows you to make any Twitter user, of your choosing and without their consent, into one of your followers. This is no “bug” folks — It is a backdoor…

Pirates versus Internet Service Providers

Court orders ISP to disconnect The Pirate Bay from the Internet. But the lack of an adequate Disaster Recovery and Contingency Plan (DRCP) left it unprepared for what happened next.