Who Am I?

I frequently talk to myself.  I think that this is mostly OK, except when I have an argument.  The other day, I asked myself, “Who am I?” and I was surprised with the answer.  It turns out that this is not a simple question, especially if the one asking is a computer (of course, they…

Details

Why Does My Secret Decoder Ring Keep On Breaking?

I’ve been around the computer business for a long time.  Way back, before the Web and even before computers, if you wanted to send a secret message to someone, you used a simple substitution code.  An example of this was the Caesar cipher. This was a simple rotation or shift of the alphabet. Plain:    ABCDEFGHIJKLMNOPQRSTUVWXYZ…

Details

In-House Software Development — Is it Worth the Risk?

Nowadays, data breaches are a subject of conversation at dinner tables and in boardrooms. Cyber insurance premiums to cover these breaches are skyrocketing. Recent surveys and breach reports have highlighted the challenges with software security. The 2015 Annual Verizon Data Breach Investigations Report points out that applications are the number one attack vector leading to…

Details

What Is an Act of War?

I went to the Educause Security Professionals Conference last week.  I have been going to this conference for many years and always take home something useful.  This year, James Bamford, best known as an expert on the NSA, gave the keynote address.  His talk was about how America has lost control of this secret and…

Details

Booth Babes Banned at RSA – A CSO’s View

While I was unable to attend RSA this year, after reading Chenxi Wang’s LinkedIn post on ‘Booth Babes’, I have to say… It’s about damn time. To briefly recount a personal experience, several years ago, while walking this same Moscone floor, I was quite literally almost run over by a lycra-wearing ‘policewoman’ buzzing around the expo floor…

Details