What is Really Needed to Reform the NSA
Posted on: 17 Jan 2014
Here is how it is going to play out. Starting with the lackluster reforms that President Obama introduced today, reducing meta data based surveillance to two instead of three links,…
Survela Aims to Protect Your Personal Brand
Posted on: 14 Jan 2014
Most organizations are familiar with Mark Monitor, A Thomson Reuters service that continuously scans the Internet for abuses of brands and intellectual property. If a counterfeit website or even a…
Three Must Watch Videos to Understand Why Bitcoin is Disruptive
Posted on: 14 Jan 2014
Bitcoin was the hot topic of summer 2013. It lost some of its luster when the largest Chinese exchange, BTC, announced it was no longer taking deposits in Yuan, and…
Thoughts on Boycotting the RSA Conference
Posted on: 07 Jan 2014
[Full disclosure: As an industry analyst I conduct business with RSA, the security division of EMC, including white papers and recording videos of key executives and customers.] Update Jan 12, 2014: …
Schneier Joins Co3 Systems as CTO
Posted on: 06 Jan 2014
Security incident handling software company, Co3 Systems, announced today that Bruce Schneier had joined the company as CTO. Schneier is a highly regarded author and cryptographer who writes frequently on topics…
Will FireEye’s Acquisition Strategy Work?
Posted on: 05 Jan 2014
Most of the press and preliminary analysis of the FireEye acquisition of Mandiant has been exuberant. The New York Times got to break the news just after the first of the New…
Growing Boycott of RSA Conference 2014
Posted on: 05 Jan 2014
[Full disclosure: As an industry analyst I conduct business with RSA, the security division of EMC, including white papers and recording videos of key executives and customers.] It began with…
IT Security Industry Has a New Adversary
Posted on: 30 Dec 2013
My coverage of the NSA’s massive data gathering and attacks on fundamental security technology has been focused on the expected impact on the IT security industry. I was one of…
The Incredible Power of XKeyscore
Posted on: 30 Dec 2013
Der Spiegel makes light of an incredible tidbit they extracted from a 50-page catalog of exploit technology apparently developed by the NSA’s Tailored Access Operations (TAO). The German newspaper describes, and dismisses as…
IT Security Industry Has a New Adversary
Posted on: 30 Dec 2013
My coverage of the NSA’s massive data gathering and attacks on fundamental security technology has been focused on the expected impact on the IT security industry. I was one of…