The InfoSec Blog

The InfoSec Blog

System Integrity: Context Is Everything

  • About The Author
  • Master Index
  • Presentations
  • System Integrity

Category: Social

May 25, 2012

Why Info Sec Positions Go Unfilled

http://www.infosecleaders.com/2012/05/career-advice-tuesday-why-info-sec-position-go-unfilled/ There are many holes in this, but I think they miss some important points. First is setting IT HR to look for Infosec….

May 15, 2012

If Customers Ask for More Choice, Don’t Listen

http://blogs.hbr.org/cs/2012/05/customers_arent_as_savvy_as_yo.html Perhaps the reason that Apple is ahead with the iPod, iPhone and iPad is that the competitors are offering too much choice. That…

April 5, 2012

An OP-ED by Richard Clarke on China

http://www.nytimes.com/2012/04/03/opinion/how-china-steals-our-secrets.html This is better written than most ‘chicken little’ pieces, but please can we have ‘history’ of how most nations, including the USA, have…

March 23, 2012

Social Engineering and sufficency of awareness training

Someone asked: If you have a good information security awareness amongst the employees then it should not a problem what kind of attempts are…

March 22, 2012

Orwell: a quarter of a century late

http://hdguru.com/is-your-new-hdtv-watching-you/7643/ well 28 years actually … So, the two-way tv sets of Orwell’s novel have arrived, over a quarter of a century late! It…

February 10, 2012

Please Realize That Piracy is a Service Problem.

http://www.forbes.com/sites/insertcoin/2012/02/03/you-will-never-kill-piracy-and-piracy-will-never-kill-you/ The full article is a bit wordy, and manages to avoid lecturing about how the media industry failed at “service” when it came…

January 25, 2012

“Cybercrime” is still Crime and “Cyberfraud” is still Fraud

http://www.techsecuritytoday.com/index.php/our-contributors/michael-vizard/entry/lifting-the-veil-on-cybercrime This says it all: At the end of the day, cybercriminal activity is not all that different from more traditional forms of organized…

August 6, 2011

Schneier on Security: Hacking Cars Through Wireless Tire-Pressure

http://www.schneier.com/blog/archives/2010/08/hacking_cars_th.html A few alarming things here. More nanny State : In other words, the nanny state is forcing upon us expensive and insecure systems…

August 6, 2011

Would you buy a computer from a company like this?

http://consumerist.com/2011/05/security-expert-sony-knew-its-software-was-obsolete-months-before-psn-breach.html Its not a camera, its computer that takes pictures Its not a car, its a computer that gets you from place to place…

August 6, 2011

Fwd: How Quality Drives the Rise and fall of hi-tech products

http://sloanreview.mit.edu/the-magazine/2011-summer/52403/how-quality-drives-the-rise-and-fall-of-high-tech-products I’m dubious. On the one hand I recall a book titled “In Search of Stupidity“, which I strongly recommends reading, its about the…

July 21, 2011

Economic Impact: Patent trolls chase app developers out of the U.S

http://www.linuxfordevices.com/c/a/News/Kootol-joins-Lodsys-as-a-patent-troll/?kc=LNXDEVNL072111 The Debt ceiling crisis will pass; even if there is a crash, the USA can recover from it … IF its core economic…

July 8, 2011

He’s not Ian Paisley

I was at a presentation yesterday. One of the vendor’s speakers, I’m sorry to say, was a CISSP. OK, he wasn’t Ian Paisley or…

April 19, 2011

Congressman blames U.S. unemployment crisis on iPad

http://www.zdnet.com/blog/apple/congressman-blames-us-unemployment-crisis-on-ipad/9968?tag=nl.e539 In it U.S. Representative Jesse Jackson Jr (D-IL) blasts Apple and Steve Jobs claiming that the iPad is responsible for killing thousands of…

January 31, 2011

IT AUDIT VS Risk Assessment – 2

We were discussing which should be done first and someone said: The first has to be risk assessment as it is foundation of information…

January 16, 2011

Black Swan: “levels only experienced on average once every 500 to

http://news.discovery.com/earth/megastorm-californias-other-big-one.html Just in the last 15 years, since microwave technology aboard satellites produced images of water vapor in the atmosphere, scientists have come to…

January 6, 2011

Risk due to network administrators

Someone on a forum I subscribe to suggested that there is a major risk of network administrators misusing their privileges. Why admins rather than…

September 15, 2010

Career Insights from Stephen Northcutt, CEO of SANS

http://www.bankinfosecurity.com/articles.php?art_id=2914 Fascinating. I get a lot of enquiries from wannabes who, as they put it, want to “break into security“. I presume they see…

August 20, 2010

Open source and commercial support

In a discussion of Open Source vs Closed Source/Commercial … Voice 1: Maybe because they’re not customers? (in the paying for a service sense)…

July 29, 2010

RIM vs. Indian government continues

http://www.zdnet.com/blog/india/rim-vs-indian-government-continues/135?tag=nl.e539 … and the UAE. RIM is between a rock and a hard place. They say no to this and they loose a market;…

June 4, 2010

Google Phasing out Windows

http://www.h-online.com/security/news/item/Report-Google-phasing-out-internal-use-of-Microsoft-Windows-1012679.html “According to a report in the Financial Times, Google are phasing out the use of Microsoft‘s Windows within the company because of security…

Posts navigation

Previous 1 2 3 … 5 Next

Availability

I am currently available to offer InfoSec & GRC audit and consulting services through my company - System Integrity

Popular Pages

  • The Classical Risk Equation
  • Separation of Duties: Infosec, IT and Audit
  • “Cybercrime” is still Crime and “Cyberfraud” is still Fraud
  • Risk Analysis makes no sense … Does it?
  • Are *you* ready to give up yet?
  • Why InfoSec Positions go unfilled
  • Security
  • Risk
  • ISO27K
  • Rants and Raves

Categories

Archives

Calendar of Posts

March 2021
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  
« Sep    

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Security Links

  • Schneier on Security
  • Gary Hinson
  • Martin McKeay
  • The Security Team
  • DHS Daily Report
  • SANS Security Alerts
  • Bruce Schneier
  • CERT-CC
  • MSDN- Security
  • Microsoft TechNet – Security
Copyright The InfoSec Blog. All rights reserved. | Powered by WordPress & Writers Blogily Theme