Tag Archives: Solutions / Workarounds

What Cyber Security Can Teach Us About Preventing Mass School Shootings

– Cyber security deals with proliferation of insecure devices at a mass scale similar to the volume of guns. Cyber and physical security have overlapping protection concepts: The scale and insights of cyber illustrate why our current debate is frozen with people arguing the same tireless points that…

Video: Hard Drives – Watch Them Shred

– While it’s the dream of almost every information security department to send their hard drives off to the shredder to destroy sensitive data, few of us have actually witnessed it. Below is a YouTube video that shows the visual process that turns our precious hard drives turn to scrap. Enjoy!…

Building an Access Control Framework (pt. 1)

– From what I have seen of Identity Management tools, they are more about management than identity, which is fine, once you have solved the the challenge of effectively identifying all the users of your sensitive data. But, slick as they can be, an IdM tool may only automate your existing processes…

Fare Timing Attacks on the Long Island Railroad (LIRR)

– The Long Island Rail Road (map) is run by the MTA and is the primary way for the majority of people who live on Long Island commute into NYC for work. I noticed the same phenomena occurring a number of times and then realized that people were using timing attacks to get free rides on […] …

Intel ROSI Paper: Sets Practical Guidelines and Proper Expectations

– Late last year I read Matthew Rosenquist’s paper, Measuring the Return on IT Security Investments, over at Intel. I’m glad I have a few minutes to write about it. The premise for the paper is simple: the implementation of a security measure (control) should result in a decrease in the…