Focus on Quality Improves Computer Security
There is a great white paper at sans.org Elizabeth Stanton wrote it to highlight “Security through Quality Assurance Practices” I found it by doing a google search “quality computer security”.…
Analyzing Data Breaches: Can we Tolerate Status Quo?
An interesting paper on the analysis of the frequency of data breaches. It is an attempt by Benjamin Edwards, Steven Hofmeyr, and Stephanie Forrest. These researchers obtained the data from…
If a Firewall is Useless What to Do?
As I was scanning the Internet for interesting relevant articles this is the one I thought was unique in discussing a fundamental issue of our time(in 2015) http://www.infoworld.com/article/2616931/firewall-software/why-you-don-t-need-a-firewall.html Plus Roger…
Stop Attacking Me – Don’t exploit My Code Bro
The Oracle CSO (Chief “Security” Officer) statements show a misunderstanding of IT security principles. IT-Security BlogNotions post is appropriate: That is why I came up with “Don’t Expose My Code…
Courts Uphold FTC Regulation-Punishment to Negligent Company
Threatpost has the story: https://threatpost.com/court-rules-ftc-has-authority-to-punish-wyndham-over-breaches/114390 From the court brief http://www2.ca3.uscourts.gov/opinarch/143514p.pdf are some interesting snippets: Let’s list the cybersecurity problems that Wyndham had: Stored CC data (which is a violation of…
