Why Does My Secret Decoder Ring Keep On Breaking?
I’ve been around the computer business for a long time. Way back, before the Web and even before computers, if you wanted to send a secret message to someone, you…
DetailsI’ve been around the computer business for a long time. Way back, before the Web and even before computers, if you wanted to send a secret message to someone, you…
DetailsNowadays, data breaches are a subject of conversation at dinner tables and in boardrooms. Cyber insurance premiums to cover these breaches are skyrocketing. Recent surveys and breach reports have highlighted…
DetailsI went to the Educause Security Professionals Conference last week. I have been going to this conference for many years and always take home something useful. This year, James Bamford,…
DetailsThe world of the CISO is becoming an almost thankless job. No matter what you do, how well you present to the Board, how complete your program is, it seems…
DetailsWhile I was unable to attend RSA this year, after reading Chenxi Wang’s LinkedIn post on ‘Booth Babes’, I have to say… It’s about damn time. To briefly recount a personal experience,…
DetailsOne of the aphorisms used in security is, “We have to be right all of the time, and the bad guys only have to be right once.” While this may…
DetailsBayes’ Theorem essentially measures the degree of belief, or certainty in something. The Cybersecurity industry has been challenged with the idea of sensitivity and specificity for quite some time. In…
DetailsDistributed Denial of Service (DDoS) attacks are very inefficient but very effective. Auditors are careful to be sure their findings are accurate so that they are not accused of being…
DetailsJust for fun, I decided to count how many unsolicited emails I got in a 24 hour period offering to either fix my security problems, fix my network problems, fix…
DetailsSo you want to know what the secret to success is. First, you need to change the way you look at and ask the question. Instead of wondering what the…
DetailsIf you have ever sat through an orchestral concert, you would hear the first chair oboe playing a single note for the rest of the fellow orchestral players to latch onto…
DetailsAs a security professional, I have an ongoing love/hate relationship with privacy. I have always been the person supporting privacy policies at the University, I even have Privacy as one…
Details