Threats, Threat Modeling and Analysis
This is a super high level presentation about basic threat modeling, SDL, and why a proactive stance is better than a reactive. I thought that it was fun. Threats, Threat […]
This is a super high level presentation about basic threat modeling, SDL, and why a proactive stance is better than a reactive. I thought that it was fun. Threats, Threat […]
The current field of information security is largely one of arcana, vagueness, arbitrary views, philosophy, mountaintop sages, a general lack of reliable data, and legions of vendors selling “best practices.” […]
In this brave new internet world (as of about 1995), I’ve been thinking of my personal information sharing generally as public and private. Information Classification Because of my work, classifying […]
After a few years of avoiding the cable industry, I went ahead and signed up for Comcast Highspeed2Go, a new bundled service where they resell Clearwire and combine it with […]
There is a lot of perennial talk of social engineering and direct project/resource management. Attempts to solve complicated political situations with manipulation or a slick widget tend not to work […]
I wanted to continue a bit where I left off with a non-technical explanation of what people such as myself do and my commentary on evolving technology management. Here is […]
This is a reprint of my comment to a Joshua Corman’s posting on The Fudsec Blog. Consider going there to read his article and the discussion that followed. I can’t […]
It’s been quite a while since I’ve seen an updated guide on email etiquette or netiquette in general. This may be because there is about 300 guides written by out […]
Here is my list of the most important talks of the 26th Chaos Communication Congress [26C3] held in Berlin, Germany that was held last week. Since my German language skills […]
My EEE PC 901 was great. The only problem was that I couldn’t stand the keyboard and so our romance ended abruptly. This made me sad, so it was banished […]