For Whom the Bell Curve Tolls

People prefer to choose the groups they are in.  Even before social media exploited that, there were fan clubs, fraternities, sororities, and many different kinds of groups that people associated themselves with. There are also the groups that people don’t choose but through birth, prejudice, unforeseen circumstances and/or unwanted diagnoses, they find themselves in nonetheless. …

Details

From the War Room to the Boardroom – The True Elevation of the CISO

In the aftermath of the Target breach, there has been a lot of press on the need for a Chief Information Security Officer (CISO) in the boardroom.  The Wall Street Journal, the NY Times, Forbes, and a host of other business publications are calling for a senior information risk executive to have the proverbial ‘seat…

Details

Walking the Security Tightrope

Some 38 years ago, I started working for the systems group at CUCCA (Columbia Center for Computing Activities).  I was fresh out of engineering school (Columbia, by coincidence) and a brand new junior systems programmer. In those days, we actually wrote modifications to the operating system in assembly language – it was a lot of…

Details

Deja Vu All Over Again – DDoS Amplification Attacks

Yep, it’s time to use this title again. This time we’re talking about Distributed Denial of Service (DDoS) amplification attacks. One of the lists I monitor posted the following: Christian Rossow has done some great work on DDoS.  The two interesting papers are: “Exit from Hell? Reducing the Impact of Amplification DDoS Attacks,” read here. The…

Details

Anti-Viral

Aggregating is the inverse of broadcasting.   What complicates this is that many technologies are now used for both.  Cell phones are the best example.  They are a device originally designed for communication. Their original purpose was  for transmitting information between individuals and they have evolved into one that can broadcast that information via social media. …

Details