Bad Penny

Bound to turn up. The adventures of an early adopter.

Main Menu

Skip to content
  • About Ian Gorrie

Threats, Threat Modeling and Analysis

May 21, 2010by gorrie 3 Comments

This is a super high level presentation about basic threat modeling, SDL, and why a proactive stance is better than a reactive. I thought that it was fun. Threats, Threat […]

Read Article →
Information Security, Presentations

The Art of Keeping Things Done

April 9, 2010by gorrie 11 Comments

The current field of information security is largely one of arcana, vagueness, arbitrary views, philosophy, mountaintop sages, a general lack of reliable data, and legions of vendors selling “best practices.” […]

Read Article →
Information Security, Presentations

Public and Private

February 22, 2010by gorrie Leave a comment

In this brave new internet world (as of about 1995), I’ve been thinking of my personal information sharing generally as public and private. Information Classification Because of my work, classifying […]

Read Article →
Biographical, Internet

Monopoly Customer Service

February 12, 2010by gorrie 2 Comments

After a few years of avoiding the cable industry, I went ahead and signed up for Comcast Highspeed2Go, a new bundled service where they resell Clearwire and combine it with […]

Read Article →
Business, Internet

The Politics of Respect

February 12, 2010by gorrie Leave a comment

There is a lot of perennial talk of social engineering and direct project/resource management. Attempts to solve complicated political situations with manipulation or a slick widget tend not to work […]

Read Article →
Business, Information Security, Politics

Specialists, Generalists, Incompetence, and Cognitive Bias

January 24, 2010by gorrie 3 Comments

I wanted to continue a bit where I left off with a non-technical explanation of what people such as myself do and my commentary on evolving technology management. Here is […]

Read Article →
Information Security

Agile Infosec

January 23, 2010by gorrie 1 Comment

This is a reprint of my comment to a Joshua Corman’s posting on The Fudsec Blog. Consider going there to read his article and the discussion that followed. I can’t […]

Read Article →
Information Security

New Nettiqute: A simple guide to communicating with your favorite geeks.

January 20, 2010by gorrie 4 Comments

It’s been quite a while since I’ve seen an updated guide on email etiquette or netiquette in general. This may be because there is about 300 guides written by out […]

Read Article →
Internet

Best of 26c3

January 4, 2010by gorrie 1 Comment

Here is my list of the most important talks of the 26th Chaos Communication Congress [26C3] held in Berlin, Germany that was held last week. Since my German language skills […]

Read Article →
Information Security, Internet, Technology

EEE PC Redux

December 31, 2009by gorrie 3 Comments

My EEE PC 901 was great. The only problem was that I couldn’t stand the keyboard and so our romance ended abruptly. This made me sad, so it was banished […]

Read Article →
Technology

Post navigation

← Previous 1 2 3 … 13 Next →

Recent Posts

  • DDoS: The Democracy of Crime October 5, 2017
  • Preventing Catastrophe(s) October 23, 2016
  • FTC Start with Security OWASP Talk October 10, 2016
  • Application Penetration and Code Analysis for Non-Developers May 29, 2012
  • Destroy Your Infrastructure February 23, 2012

Categories

Currently Reading

Social

  • View gorrie’s profile on Twitter
  • View gorrie’s profile on LinkedIn
  • View gorrie’s profile on GitHub
  • View IanGorrie’s profile on Google+

Twitter

My Tweets
Blog at WordPress.com.
Bad Penny
Blog at WordPress.com.
  • Follow Following
    • Bad Penny
    • Already have a WordPress.com account? Log in now.
    • Bad Penny
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...