The Art of Keeping Things Done
The current field of information security is largely one of arcana, vagueness, arbitrary views, philosophy, mountaintop sages, a general lack of reliable data, and legions of vendors selling “best practices.” […]
The current field of information security is largely one of arcana, vagueness, arbitrary views, philosophy, mountaintop sages, a general lack of reliable data, and legions of vendors selling “best practices.” […]
There is a lot of perennial talk of social engineering and direct project/resource management. Attempts to solve complicated political situations with manipulation or a slick widget tend not to work […]
I wanted to continue a bit where I left off with a non-technical explanation of what people such as myself do and my commentary on evolving technology management. Here is […]
This is a reprint of my comment to a Joshua Corman’s posting on The Fudsec Blog. Consider going there to read his article and the discussion that followed. I can’t […]
Here is my list of the most important talks of the 26th Chaos Communication Congress [26C3] held in Berlin, Germany that was held last week. Since my German language skills […]
Tired of reading yet another cloud security article? This is really the only one you need to read. If you don’t have the attention span to read it all, read […]
H.R. 2221 defines personal information as, “an individual’s first name or initial and last name, or address, or phone number, in combination with any 1 or more of the following […]
Tapping into drones’ video feeds was just the start. The U.S. military’s primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to […]
The folks who run Amazon’s EC2 cloud service must be happy the week is nearly over. The cloud-based EC2 (Elastic Compute Cloud) was kept jumping this past week by two […]
It’s nice that geeks are cool now. Now there are a lot of people who say they’re hardcore. Here’s some of them: These stereotypes are not who I’m going to […]