Bad Penny

Bound to turn up. The adventures of an early adopter.

Main Menu

Skip to content
  • About Ian Gorrie

Category Archives: Information Security

The Art of Keeping Things Done

April 9, 2010by gorrie 11 Comments

The current field of information security is largely one of arcana, vagueness, arbitrary views, philosophy, mountaintop sages, a general lack of reliable data, and legions of vendors selling “best practices.” […]

Read Article →
Information Security, Presentations

The Politics of Respect

February 12, 2010by gorrie Leave a comment

There is a lot of perennial talk of social engineering and direct project/resource management. Attempts to solve complicated political situations with manipulation or a slick widget tend not to work […]

Read Article →
Business, Information Security, Politics

Specialists, Generalists, Incompetence, and Cognitive Bias

January 24, 2010by gorrie 3 Comments

I wanted to continue a bit where I left off with a non-technical explanation of what people such as myself do and my commentary on evolving technology management. Here is […]

Read Article →
Information Security

Agile Infosec

January 23, 2010by gorrie 1 Comment

This is a reprint of my comment to a Joshua Corman’s posting on The Fudsec Blog. Consider going there to read his article and the discussion that followed. I can’t […]

Read Article →
Information Security

Best of 26c3

January 4, 2010by gorrie 1 Comment

Here is my list of the most important talks of the 26th Chaos Communication Congress [26C3] held in Berlin, Germany that was held last week. Since my German language skills […]

Read Article →
Information Security, Internet, Technology

Swamp Computing

December 28, 2009by gorrie 1 Comment

Tired of reading yet another cloud security article? This is really the only one you need to read. If you don’t have the attention span to read it all, read […]

Read Article →
Information Security, Internet

Federal Data Breach Bill (H.R. 2221) Passes House

December 22, 2009by gorrie Leave a comment

H.R. 2221 defines personal information as, “an individual’s first name or initial and last name, or address, or phone number, in combination with any 1 or more of the following […]

Read Article →
Information Security

Militants Can Snoop on Most U.S. Warplanes, Drones

December 17, 2009by gorrie Leave a comment

Tapping into drones’ video feeds was just the start. The U.S. military’s primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to […]

Read Article →
Information Security

Amazon EC2 cloud service hit by botnet, outage

December 14, 2009by gorrie 3 Comments

The folks who run Amazon’s EC2 cloud service must be happy the week is nearly over. The cloud-based EC2 (Elastic Compute Cloud) was kept jumping this past week by two […]

Read Article →
Information Security

What we do

November 4, 2009by gorrie 2 Comments

It’s nice that geeks are cool now. Now there are a lot of people who say they’re hardcore. Here’s some of them: These stereotypes are not who I’m going to […]

Read Article →
Biographical, Business, Information Security, Management

Post navigation

← Previous 1 2 3 … 5 Next →

Recent Posts

  • DDoS: The Democracy of Crime October 5, 2017
  • Preventing Catastrophe(s) October 23, 2016
  • FTC Start with Security OWASP Talk October 10, 2016
  • Application Penetration and Code Analysis for Non-Developers May 29, 2012
  • Destroy Your Infrastructure February 23, 2012

Categories

Currently Reading

Social

  • View gorrie’s profile on Twitter
  • View gorrie’s profile on LinkedIn
  • View gorrie’s profile on GitHub
  • View IanGorrie’s profile on Google+

Twitter

My Tweets
Blog at WordPress.com.
Bad Penny
Blog at WordPress.com.
  • Follow Following
    • Bad Penny
    • Join 544 other followers
    • Already have a WordPress.com account? Log in now.
    • Bad Penny
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...