Security, Where Myths Should Go to Die
There are tellers of tales and debunkers of myths. An organization needs both. An example: the March of Dimes needed people to have the vision of eradicating Polio. Its very…
There are tellers of tales and debunkers of myths. An organization needs both. An example: the March of Dimes needed people to have the vision of eradicating Polio. Its very…
One would think that working in a very prestigious university would simplify the job of the security department. All you would have to do is tell people what was required…
You know you’ve reached a point in your career when you get asked to give a talk on how IT has evolved over the past 10-15 years. I guess it’s a…
(This is the sixth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
VA Tech is one of the few institutions in the US that runs a full production, dual stack IPv4/IPv6 network. We’ve been running this dual stack network since 2005. All…
(This is the fifth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
CONTROL: Minimize the number of users with domain or local administrative privileges. Such users should use a separate unprivileged account for email and web browsing. This control is misunderstood and…
(This is the fourth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
I think that there is some confusion about the concept of privacy in a public setting. It appears to me that some people really believe that they can walk around,…
I was recently invited to speak to senior executives about traveling with electronic devices. I designed a presentation consisting of 11 slides and guessed it would take about half and…