How To Stay Secure in Insecure World
I want to highlight 2 current articles: http://www.infosecurity-magazine.com/news/pawn-storm-serves-malware-via-fake/ and http://googleonlinesecurity.blogspot.com/2015/07/new-research-comparing-how-security.html It is best to use good passwords, 2factor authentication, and patch your systems The first article points to how a…
Focus on Quality Improves Computer Security
There is a great white paper at sans.org Elizabeth Stanton wrote it to highlight “Security through Quality Assurance Practices” I found it by doing a google search “quality computer security”.…
Analyzing Data Breaches: Can we Tolerate Status Quo?
An interesting paper on the analysis of the frequency of data breaches. It is an attempt by Benjamin Edwards, Steven Hofmeyr, and Stephanie Forrest. These researchers obtained the data from…
If a Firewall is Useless What to Do?
As I was scanning the Internet for interesting relevant articles this is the one I thought was unique in discussing a fundamental issue of our time(in 2015) http://www.infoworld.com/article/2616931/firewall-software/why-you-don-t-need-a-firewall.html Plus Roger…
Stop Attacking Me – Don’t exploit My Code Bro
The Oracle CSO (Chief “Security” Officer) statements show a misunderstanding of IT security principles. IT-Security BlogNotions post is appropriate: That is why I came up with “Don’t Expose My Code…
