Tag Archives: Solutions / Workarounds
What Cyber Security Can Teach Us About Preventing Mass School Shootings
March 7, 2018 – 6:00 am
–
Cyber security deals with proliferation of insecure devices at a mass scale similar to the volume of guns. Cyber and physical security have overlapping protection concepts: The scale and insights of cyber illustrate why our current debate is frozen with people arguing the same tireless points that…
Video: Hard Drives – Watch Them Shred
January 29, 2009 – 5:00 am
–
While it’s the dream of almost every information security department to send their hard drives off to the shredder to destroy sensitive data, few of us have actually witnessed it. Below is a YouTube video that shows the visual process that turns our precious hard drives turn to scrap. Enjoy!…
Building an Access Control Framework (pt. 1)
April 16, 2008 – 6:00 am
–
From what I have seen of Identity Management tools, they are more about management than identity, which is fine, once you have solved the the challenge of effectively identifying all the users of your sensitive data. But, slick as they can be, an IdM tool may only automate your existing processes…
Intel ROSI Paper: Sets Practical Guidelines and Proper Expectations
January 24, 2008 – 6:00 am
–
Late last year I read Matthew Rosenquist’s paper, Measuring the Return on IT Security Investments, over at Intel. I’m glad I have a few minutes to write about it. The premise for the paper is simple: the implementation of a security measure (control) should result in a decrease in the…
Fare Timing Attacks on the Long Island Railroad (LIRR)