`
A
- ABS (1)
- Accepted Industry Practice (1)
- Access control (4)
- ACCOUNTABILITY (1)
- ACCOUNTABLE (1)
- Adam Smith (0)
- Air Florida Potomac River (1)
- Air Force (1)
- Air Force Abruptly Scraps (1)
- Air Force Kill (1)
- Alan Cooper (2)
- ale (2)
- Although Perl (0)
- ALWAYS (1)
- AM (1)
- Amanda Ripley (1)
- Amazon (3)
- AMD (1)
- America Internet (1)
- American Empire (1)
- American Entrepreneur (1)
- Analog Risk Assessment (1)
- Android (4)
- Antivirus software (1)
- Apple (8)
- Apple Flooded (1)
- APT (1)
- ARA (1)
- ARP (0)
- Asia (2)
- Assessment Audit Reports (1)
- Asset (4)
- ATT (0)
- Attack surface (1)
- Audit (4)
- Audit Evidence Acquisitionv3 (1)
- Australia (1)
- Authentication (1)
- AV (2)
- awareness (7)
- more »« less
B
- Background Checks (1)
- Backup (1)
- Backup Programs (1)
- backups (5)
- Bad Guys (2)
- Bah Humbug (1)
- Basel II (1)
- BASELINE (2)
- Baseline Practices (1)
- BC (0)
- BCP (1)
- Becky Herrold (0)
- Belize (1)
- Bell Book and Candle (1)
- Bernie Saunders (0)
- best practices (3)
- Bible_code Criticism (0)
- Big Brother (2)
- Big Business (1)
- Big Data (1)
- Biggest Information Security Myths (1)
- Big Iron (1)
- Big N-1 (1)
- Big N-1 Accounting (1)
- Big Name Firm (1)
- BILLION (1)
- Bill Murray (1)
- Black Hat (1)
- BMW (1)
- Board of Directors (1)
- books (8)
- BOSE (1)
- Botnet (2)
- BP (1)
- britex (1)
- British India (1)
- Briton Robert Fortune (1)
- browser (2)
- Bruce Schneier (7)
- BS (2)
- BSD (2)
- BTDT (1)
- Business (21)
- Business and Economy (2)
- Business continuity (1)
- Business Continuity Planning (4)
- Business process (1)
- Buy Problem (1)
- BYOD (1)
- more »« less
C
- canada (7)
- Canon A1 (1)
- careers (1)
- Catastrophic Avira (1)
- CBK (2)
- CBS (1)
- CEO (2)
- Certification (3)
- Certified Information System Security Professional (1)
- Certified Information Systems Security Professional (6)
- CFO (1)
- Challenger Disaster (1)
- Chief James Steffens (1)
- Child pornography (1)
- Child Protection (1)
- China (3)
- CIA (1)
- CIO (1)
- CISA (2)
- CISSP (8)
- Citroën (1)
- CLASSICAL (1)
- Classical Equation (1)
- Classical Risk Equation (2)
- Cloud computing (1)
- CMU (0)
- COBIT (3)
- Collateral damage (2)
- Common Desktop Virtualization Mistakes (1)
- Common sense (1)
- Communications (1)
- Compact Disc (1)
- Companies (1)
- compensatory (1)
- compliance (7)
- Computer crime (1)
- Computer file (1)
- Computer security (6)
- Confidence trick (2)
- Consultants (6)
- Consulting Mode (1)
- Consumer Behavior (1)
- context is everything (2)
- controls (29)
- Cooking (1)
- Copyright (1)
- Copyright infringement (1)
- Corporate Information System (1)
- COSO (4)
- Cosplay (1)
- CPAN (0)
- CPIO (1)
- CPU (1)
- CRE (2)
- Credit Monitoring (1)
- CRIMINAL (1)
- Critical Java (1)
- Cryptography (1)
- Cryptonomicon (1)
- CSIS (1)
- cybercrime (2)
- Cyber Czar (1)
- cyberfraud (1)
- CyberSecurity (1)
- Cybersecuyrity (1)
- more »« less
D
- Dancing Pigs (1)
- Dante Gabriel Rossetti (1)
- Dartmouth College (0)
- Database (1)
- Data Loss Prevention (1)
- David Rice (1)
- Debra Littlejohn Shinder (1)
- Decision making (1)
- Defcon (1)
- Defece in depth (1)
- Defense Secretary Carter (1)
- Dejan Kosutic (1)
- Delta Air Lines (1)
- Deming (1)
- Denial-of-service attack (1)
- detective (3)
- DHCP (0)
- DHS (1)
- Digital Economy Bill (1)
- Digital signature (1)
- dilbert (1)
- Disaster (1)
- Disk partitioning (1)
- DLP (1)
- DMCA (1)
- DMZ (1)
- DNS (0)
- documentation (4)
- Document Viewer (1)
- Donn B. Parker (1)
- Donn Parker (9)
- Douglas Berdeaux (0)
- Downtime (1)
- DR (1)
- DRP (2)
- DSLR (1)
- DSS (0)
- Due Diligence (1)
- DUI (1)
- DVD (3)
- Dystopia (0)
- more »« less
E
- E-mail filtering (2)
- Earth (0)
- Eastern World (1)
- EBay (1)
- Economic (1)
- Economics (1)
- Economy (1)
- Editing (2)
- Editors (1)
- Education (1)
- Education and Training (1)
- EFF (1)
- Effective Communication (1)
- eHealth (1)
- Electronic mailing list (1)
- Electronic Privacy (1)
- Electronic Privacy Information Center (0)
- Email (1)
- Emergency management (1)
- Employment (1)
- Encryption (1)
- England (2)
- English language (2)
- English Speaking World (1)
- Eng Lit (1)
- ENISA (1)
- Enron (1)
- Enterprise Asset Management (1)
- Enterprise Rights Management (1)
- Enterprise Risk Management (2)
- Entrepreneurship (0)
- Espionage (1)
- Ethics (1)
- Europe (3)
- European Commission (1)
- European Network and Information Security Agency (1)
- EVERYONE (1)
- Exploit (1)
- more »« less
F
- Facebook (2)
- failure (5)
- Failure Mode Effect Analysis (1)
- failures (2)
- FAIR (2)
- Fanny Price (1)
- FAQ (1)
- FBI (4)
- Federal Bureau of Investigation (0)
- File Management (1)
- Film Camera (1)
- Financial Times (1)
- Fingerprint (1)
- Firefox (1)
- Firestone Ford Explorer (0)
- Firewall (1)
- Flavor Flav Bandit (1)
- Flu Season (0)
- FMEA (7)
- Follow Policy (1)
- FOOD (1)
- Former Gizmodo (1)
- FOSS (2)
- Four Arguments for the Elimination of Television (1)
- France (1)
- Frank Gavin (1)
- FRAP (2)
- fraud (5)
- Fred Cohen (1)
- Fredrick Winslow Taylor (1)
- Freeware (1)
- Frost Sullivan (1)
- FTC (1)
- more »« less
G
- Game theory (1)
- Game Theory Regret Minization (1)
- GAO (1)
- Garfinkel Spafford (1)
- Gary Hinson (4)
- Gary Hinson Gary (0)
- General and Freelance (1)
- Gene Spafford (2)
- George Orwell (1)
- Germany (2)
- GFS (0)
- GIMP (0)
- Glasgow City Council (1)
- Global Warming (1)
- Gmail (1)
- GNP (1)
- Godwin Law (1)
- Golden Shield Project (1)
- Gold Rush (1)
- GoodReader (1)
- Google (6)
- governance (2)
- Government (1)
- GPS (3)
- Grace Hopper (1)
- Grace Murray Hopper (2)
- Grand Rapids (1)
- Greater Toronto (1)
- Greens Telcos (0)
- Greg Lake (1)
- GUI (1)
- Gulliver’s Travels (0)
- more »« less
H
- Hans Eysenk (1)
- Hard disk drive (2)
- Hardware (1)
- Harold Davis (1)
- Harvard Business Review (1)
- HD (1)
- Health (1)
- Hearing impairment (1)
- hectoring (1)
- Hemp (1)
- hiring (2)
- hiring and firing (1)
- His Bipolar (1)
- History (2)
- HLL (1)
- Homeland Security (1)
- Howard Schmidt (1)
- How to Win Friends & Influence People (1)
- HP (2)
- hr (3)
- HTML (2)
- HTML e-mail (1)
- HTTP (1)
- HUD (1)
- Human resources (1)
- Human Resources Security (1)
- Hurricane Katrina (1)
- more »« less
I
- IAM (1)
- Ian Paisley (1)
- IBM (3)
- iCloud (1)
- ID (3)
- IDE (1)
- Identity Management (1)
- Identity theft (2)
- IDG (1)
- IMAP (1)
- IMHO (1)
- Impact (2)
- Impact Probability (2)
- Incident Response (1)
- INCREASE (1)
- India (1)
- Individual Standards (2)
- Indonesia (1)
- Industrial Espionage (1)
- Industrialized West (1)
- Infectious disease (1)
- Influenza (2)
- Information Assets (1)
- Information Center (1)
- informationsecurity (2)
- Information security (22)
- Information security management system (5)
- Information Security Policy (1)
- Information Security Professionals (1)
- Information Security Professional Tony Drewitt (3)
- Information Security Risk Management (3)
- Information technology (1)
- infosec (7)
- Inkscape (0)
- insurance (7)
- Integrated development environment (1)
- Integrity (1)
- Intellectual property (1)
- IntellectualVentures (1)
- Internal audit (2)
- Internal control (2)
- International Organization for Standardization (7)
- Internet access (1)
- Internet Marketing (1)
- Internet of Things (1)
- Internet service provider (1)
- Internet World (1)
- interview (4)
- IoT (2)
- IPad (3)
- IP address (1)
- IPhone (4)
- Iranian Jewish (0)
- Ireland (1)
- Irony (1)
- ISACA (2)
- ISBN (1)
- ISC (2)
- ISIS (1)
- ISMS (4)
- ISO (6)
- ISO-27000 (5)
- ISO/IEC 27000 (7)
- ISO/IEC 27001 (14)
- ISO/IEC 27005 (1)
- ISO/IEC 31000 (1)
- ISO27K (5)
- ISO 9000 (1)
- ISO27001 (2)
- iso31000 (1)
- ISP (1)
- ISSA (1)
- Is the glass half empty or half full? (1)
- IT (8)
- ITIL (1)
- more »« less
J
- Jakob Fredriksson (1)
- Jane Austen (1)
- Java (2)
- Javed Ikbal (1)
- Jeff Lowder (1)
- Jerry Thomas (1)
- Jesse Jackson Jr (1)
- jobs (6)
- Joel Winston (1)
- Joe Sixpack (1)
- John McAfee (1)
- John Rusnak (1)
- John Stuart Mill (1)
- Joshua Corman (1)
- Journalist (1)
- more »« less
K
- K3b (1)
- Kaspersky Reports (1)
- Keeping America (1)
- Ken Thompson (1)
- kidnapping (1)
- Kim Novak (1)
- Kinect Microsoft (1)
- Knowledge Management (0)
- more »« less
L
- Language (1)
- Laptop (6)
- laptops (7)
- Larry Werring (0)
- Las Vegas Nevada (1)
- Law (3)
- Law Enforcement (1)
- Lawsuit (1)
- LDAP (1)
- Leadership (1)
- Legislation (1)
- Les Bell (2)
- Light Bulbs Slowly Illuminating (1)
- LinkedIn (3)
- Linux (18)
- Linux Archive (1)
- Local Highways (1)
- London (1)
- Lost Ernst Young (1)
- LOT (2)
- Luminaries Discuss Hot Security Trends (0)
- LVM (1)
- more »« less
M
- Macbook Air (1)
- Madison Avenue (1)
- Magazine (1)
- Magic (illusion) (1)
- Maginot Line (1)
- Mainframe (1)
- Malaysia (1)
- Malware (5)
- Management (6)
- MANDATING (1)
- Mandatory Risk Assessments (1)
- Marcus Ranum (3)
- Marketing (3)
- Marketing and Advertising (1)
- Marketing Isn (1)
- Mark Shuttleworth (1)
- Master of Business Administration (1)
- Mat Honan (1)
- MATRIX (1)
- McAfee (2)
- MCI Inc. (1)
- meetings (1)
- Mehari (1)
- METHODS (1)
- Miami Herald (1)
- microchipping (1)
- Microsoft (12)
- Microsoft Windows (1)
- Mid-west Energy Research Consortium (0)
- Mike Cook (1)
- Military Keynesianism (1)
- MILSPEC (1)
- Miranda Sensorex (1)
- MIT (1)
- Mobile Computing (1)
- Mobile device (1)
- Mode Effect Analysis (1)
- MODEL (1)
- Moore Law (0)
- Morality (1)
- Mores Law (1)
- Morgan Stanley (1)
- Morris worm (1)
- Mortality rate (1)
- motive (1)
- Mt Everest (1)
- MySpace (1)
- more »« less
N
- nanny state (1)
- NASA (2)
- National Institute of Standards and Technology (1)
- Naval War College (1)
- Navi Star (1)
- Neal Stephenson (1)
- Network address translation (1)
- Newark Liberty International Airport (1)
- New Jersey (1)
- New Orleans (1)
- New York (1)
- NFC (1)
- Ngair Teow Hin (1)
- Nick Leason (1)
- Nigerian Bimbo Olumuyiwa Oyewole (1)
- NIST (3)
- Norbert Weiner (1)
- North Korea (1)
- Notebooks and Laptops (1)
- NOTHING (1)
- NPO (1)
- more »« less
O
- OBJECTIVES (1)
- obsolete (1)
- OCTAVE (1)
- off-shore (1)
- off-shore jobs (1)
- OIG (1)
- OK (5)
- Olive Oil (1)
- OLPC (1)
- Omega Point (1)
- One Classical (0)
- One True Faith (1)
- Online Backup (1)
- Online Communities (1)
- Online Project Management Software (1)
- Ontario (1)
- OpenOffice.org (0)
- Open source (3)
- Open Source Security Testing Methodology Manual (1)
- Operating system (2)
- OPSEC (1)
- Organized crime (1)
- OS (0)
- OSINT (0)
- osstmm (1)
- owasp (2)
- more »« less
P
- Packard Hospital (1)
- Packt Publishing (1)
- Padgett Peterson (1)
- Pandemic (1)
- Pandemic Response (1)
- paranoia (2)
- Paranoid Personality Disorder (1)
- Paranoid Pessimistic Programmer (1)
- Passphrase (1)
- Passport (1)
- Password (2)
- password cracking (2)
- Password Policy (1)
- Password strength (1)
- Patch (1)
- Patent (1)
- PatentTroll (1)
- PC (7)
- PCI (0)
- PDCA (1)
- PDF (3)
- PDQ (1)
- Pearson Airport (1)
- Penetration test (1)
- penetration testing (1)
- pen test (1)
- Pen testing (3)
- perimeter (1)
- PERIOD (1)
- perl (1)
- Permanent War Economy (1)
- Personal computer (2)
- Personally identifiable information (1)
- Persuasion (1)
- Peter Drucker (3)
- Peter Gregory (0)
- PGP (1)
- Philosophy (1)
- Physical security (1)
- Physics (1)
- Pierre Teilhard de Chardin (1)
- Piracy (1)
- Pita bread (1)
- PKI (1)
- plan text (1)
- PM (0)
- Policies and procedures (1)
- Policy (16)
- Policy Development (1)
- Policy Manuals (1)
- Political Compass (1)
- Politician (1)
- Politics (1)
- Politics of Sexuality (1)
- POP (1)
- Pornography (1)
- POSIX (1)
- Postal Service (0)
- POTS (0)
- POTUS (1)
- POV (4)
- PPD (1)
- Pretty Good Privacy (1)
- preventative (1)
- Printer (1)
- Privacy (3)
- Privacy Rights Clearinghouse (1)
- PROBABILITY (0)
- PROBAILITY (0)
- PROCESS (1)
- Project management (2)
- project risk (2)
- project staffing (1)
- Protiviti Governance Portal Extends Momentum (1)
- Provincial Government (1)
- PSN (0)
- Psychology (1)
- psychology of risk (1)
- Public Key Cryptography Explained (1)
- Public key infrastructure (1)
- Public Safety (1)
- Public Speaking (1)
- more »« less
R
- RA (4)
- Racter (1)
- RCS (1)
- Rebecca Herold (1)
- Rebecca Herrold (1)
- Recording Industry Association of America (1)
- recruiting (1)
- recruitment (1)
- Religion (1)
- Remote access (1)
- Residual Risk (2)
- RESPONSE (1)
- RESTORE (1)
- Revision Control System (1)
- RIAA (1)
- Richard Clarke China (1)
- Rick Smith (3)
- Risk (11)
- Risk analysis (17)
- Risk Annalysis (0)
- Risk assessment (10)
- Risk Framework (1)
- Risk Framwork (1)
- Risk Management (17)
- Risk Management Plan (1)
- Risk Management Risk Management Outline (1)
- Risk Models (1)
- Risks Digest (1)
- Risk Theat (0)
- Risk Treatment Plan (1)
- Robert A. Heinlein (1)
- Robert Fortune (1)
- Robert Heinlein (1)
- Rob Rosenberger (1)
- rob slade (1)
- Ron Ferguson (1)
- Root Cause Analysis (1)
- Royal Mail (1)
- RSA (2)
- RTOS (2)
- Ruby (1)
- rumsfeld (1)
- Russia (1)
- Russian Cybercrime (1)
- Russian Empire (1)
- more »« less
S
- SaaS (1)
- SABSA (1)
- Salvation Army (1)
- SAMBA (2)
- Sample Policies (1)
- sanitizers (1)
- SANS (2)
- Sarah Rose (1)
- SARS (1)
- SATA (1)
- SC (1)
- SCADA (1)
- Scanners (1)
- Science fiction (0)
- SCOPE (2)
- Scope (computer science) (1)
- SD (1)
- Secure Shell (1)
- Securities & Exchange Commission (1)
- Security (32)
- Security Assessments (1)
- Security controls (1)
- Security policy (1)
- Security Practices (1)
- Security Theatre (1)
- Service-oriented architecture (1)
- Severe acute respiratory syndrome (1)
- Sexual abuse (1)
- Sexuality (1)
- SF (3)
- Shannon (1)
- Sign language (1)
- Silicon Valley (1)
- Simple Network Management Protocol (1)
- Site Management (2)
- SMB (3)
- SMTP (1)
- SNMP (1)
- Snowcrash (1)
- SoA (3)
- social engineering (6)
- Social media (2)
- Social media marketing (1)
- Social network (1)
- Social psychology (1)
- Social sciences (2)
- Social Security (2)
- Social Security number (2)
- Society and Culture (1)
- Software Monoculture (1)
- Sony (3)
- SOX (1)
- Spam (2)
- spam filters (1)
- Spanish Prisoner (1)
- SSD (0)
- SSH (1)
- SSL (3)
- Standard operating procedure (1)
- Standards (6)
- Star Trek (1)
- State Department (2)
- Statement of Applicability (2)
- statistics (5)
- Stephen Hawking (1)
- Steve Jobs (2)
- Steven King (0)
- Steve Wozniak (1)
- Storage (1)
- Stress (1)
- Sunday Security Maxim (0)
- Sun Tzu (1)
- support (10)
- swordfish (1)
- more »« less
T
- Taking Cosplay (1)
- Talk radio (1)
- Tao Te Ching (1)
- TAR (1)
- TCP (0)
- Technology (6)
- Technology Driven (1)
- Technorati Tags (1)
- Television (1)
- Terrorism (1)
- Terrorist Threat (1)
- Terry Childs (1)
- Test harness (1)
- testing (4)
- Test plan (1)
- Text editor (1)
- The Godfather (1)
- Third World (1)
- THREAT (1)
- THREATS (0)
- Thunderbird (1)
- Times Square (1)
- TLA (1)
- Toronto (3)
- Toronto Propane Blast (1)
- Toshihide Iguchi (1)
- training (8)
- Travels (0)
- Tree_of_life Religion_and_mythology (1)
- trust (1)
- Trusty Old Newton (1)
- TSA (3)
- TTC (1)
- TV (0)
- Twin Towers (1)
- Twitter (2)
- more »« less
U
- U.S. Securities and Exchange Commission (1)
- UI (2)
- UK (2)
- unemployment (1)
- United Kingdom (1)
- United States (6)
- United States Congress (1)
- Unix (2)
- URL (2)
- US (4)
- USA (9)
- USB (2)
- USB flash drive (1)
- Utopia (0)
- more »« less
V
- VCS (1)
- VDI (1)
- Veterans Affairs (1)
- vetting (2)
- Vi (1)
- Vic Toews (1)
- Vic Towes (1)
- Vietnam (1)
- visa (1)
- Visa Canada (1)
- VLAN (2)
- VMS (1)
- VSC (1)
- VU (1)
- Vulnerability (4)
- VW (0)
- more »« less
W
- Wall Street (3)
- Wall Street Journal (0)
- Walter Jon Williams (1)
- Warfare and Conflict (1)
- Warren Buffett (1)
- Washington Post Staff Writers August (1)
- Web application (1)
- Werner Heisenberg (0)
- Western World (1)
- Who Knew (1)
- WHOM (1)
- Wikipedia (2)
- Wikipedia Habib Elghanian (0)
- Windows (7)
- Windows Environment (1)
- Windows Server (1)
- Windows Servers (0)
- Windows Vista (1)
- Win Friends & Influence People (1)
- Wireless Data (1)
- WMB (0)
- WordPerfect (2)
- WorldCom (1)
- World Health Organization (2)
- Woz (1)
- WP (1)
- Writing and Editing (1)
- WRONG (1)
- WTF (1)
- more »« less
X
- XP (1)
Y
- Yasuo Hamanaka (1)
- YouTube (1)
1
- 11th Domain (1)
- 1984 (1)
2
(
- (ISC)² (1)