Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: Solutions / Workarounds

Video: Hard Drives – Watch Them Shred

– While it’s the dream of almost every information security department to send their hard drives off to the shredder to destroy sensitive data, few of us have actually witnessed it. Below is a YouTube video that shows the visual process that turns our precious hard drives turn to scrap. Enjoy!…

Building an Access Control Framework (pt. 1)

– From what I have seen of Identity Management tools, they are more about management than identity, which is fine, once you have solved the the challenge of effectively identifying all the users of your sensitive data. But, slick as they can be, an IdM tool may only automate your existing processes…

Fare Timing Attacks on the Long Island Railroad (LIRR)

– The Long Island Rail Road (map) is run by the MTA and is the primary way for the majority of people who live on Long Island commute into NYC for work. I noticed the same phenomena occurring a number of times and then realized that people were using timing attacks to get free rides on […] …

Intel ROSI Paper: Sets Practical Guidelines and Proper Expectations

– Late last year I read Matthew Rosenquist’s paper, Measuring the Return on IT Security Investments, over at Intel. I’m glad I have a few minutes to write about it. The premise for the paper is simple: the implementation of a security measure (control) should result in a decrease in the…

Marketing Value-add: Airport Security Friendly Shoes

– Florsheim is marketing airport security friendly shoes! The tag reads: This shoe affords all the comfort and support of a normal steel [?] without the anticipated travel delays. so pick up a pair. And proceed directly to your gate for departure. You can find a full list of Florsheim airport…