Richard Stiennon

Chief Research Analyst

IT-Harvest


What is Really Needed to Reform the NSA

Posted on: 17 Jan 2014

Here is how it is going to play out. Starting with the lackluster reforms that President Obama introduced today, reducing meta data based surveillance to two instead of three links,…

Survela Aims to Protect Your Personal Brand

Posted on: 14 Jan 2014

Most organizations are familiar with Mark Monitor, A Thomson Reuters  service that continuously scans the Internet for abuses of brands and intellectual property. If a counterfeit website or even a…

Three Must Watch Videos to Understand Why Bitcoin is Disruptive

Posted on: 14 Jan 2014

Bitcoin was the hot topic of summer 2013. It lost some of its luster when the largest Chinese exchange, BTC, announced it was no longer taking deposits in Yuan, and…

Thoughts on Boycotting the RSA Conference

Posted on: 07 Jan 2014

[Full disclosure: As an industry analyst I conduct business with RSA, the security division of EMC, including white papers and recording videos of key executives and customers.] Update Jan 12, 2014: …

Schneier Joins Co3 Systems as CTO

Posted on: 06 Jan 2014

Security incident handling software company, Co3 Systems, announced today that Bruce Schneier had joined the company as CTO. Schneier is a highly regarded author and cryptographer who writes frequently on topics…

Will FireEye’s Acquisition Strategy Work?

Posted on: 05 Jan 2014

Most of the press and preliminary analysis of the FireEye acquisition of Mandiant has been exuberant. The New York Times got to break the news just after the first of the New…

Growing Boycott of RSA Conference 2014

Posted on: 05 Jan 2014

[Full disclosure: As an industry analyst I conduct business with RSA, the security division of EMC, including white papers and recording videos of key executives and customers.] It began with…

IT Security Industry Has a New Adversary

Posted on: 30 Dec 2013

My coverage of the NSA’s massive data gathering and attacks on fundamental security technology has been focused on the expected impact on the IT security industry. I was one of…

The Incredible Power of XKeyscore

Posted on: 30 Dec 2013

Der Spiegel makes light of an incredible tidbit they extracted from a 50-page catalog of exploit technology apparently developed by the NSA’s Tailored Access Operations (TAO).  The German newspaper describes, and dismisses as…

IT Security Industry Has a New Adversary

Posted on: 30 Dec 2013

My coverage of the NSA’s massive data gathering and attacks on fundamental security technology has been focused on the expected impact on the IT security industry. I was one of…