Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: Tools

Data Tracing: Proposal for a Privacy and Data Security Law

– My recent Equifax issue (here, here) lead me to wonder about my personal data. Consumers should be able to find out the following: 1. What a given company is doing with one’s personal information (processing / data mining) 2. Which third parties are privy and have access to their information…

Tools to help protect your internet anonymity

– Ever need a disposable phone number or temporary login in credentials to stop receiving spam? Here is a link to a number of websites that have potentially useful privacy tools. …

bloginfosec.com Interviews Jeremiah Grossman on Web App Security

– One of the many blogs on which I keep a close eye is that of Jeremiah Grossman. His expertise is in web application security. I made his acquaintance at the 16th Annual NY Metro ISSA conference and had the good fortune to watch his Cross Site Request Forgery (CSRF) presentation. I had the chance…

Students grasp most important takeaway in teen hacking contest

– This was an interesting article on MSNBC about an Iowa State’s high-school contest in which the student “Blue Teams” are pitted against a “Red Team” of upper-class and professional security experts who try to hack the student’s computer systems. The important…

Comments on Insecure Magazine #11: Security ROI/Enablement and Schmidt Interview

– Insecure Magazine 11 was released earlier in May 2007. I read through it and two articles caught my eye. As a coincidence, both relate to my paper on Virtual Trust that was also published in the 9th edition of Insecure Magazine. The first was Security Economics (55-57). The second was the Howard…