Quantcast
Channel: Jay Heiser » risk management
Browsing all 30 articles
Browse latest View live

Peter G. Neumann on Cloud Risks

Anyone with a stake in the overall success of cloud computing should take a few minutes to read the recent NYT interview with Peter G. Neumann, a highly-respected computer security researcher who, now...

View Article



That Christmas Kindle has Strings Attached

We’ve recently moved house, and my collection of books, many of them heavily marked up with multi-colored highlights, Post-Its, and bookmarks, remains something of a storage issue.  Over the last...

View Article

Image may be NSFW.
Clik here to view.

How Valuable are Annotations

Today’s library user takes electronic catalogs for granted.  Being able to remotely search the contents of a library is not only convenient, but it also allows for a tighter integration between the...

View Article

Cruise Ships and Cloud Computing

As 4,200 disgruntled holiday goers, trapped on the ironically named cruise ship Triumph, finally end their 5 day ordeal, it serves as a reminder that the eggs can have more stake in the state of the...

View Article

If you don’t know how to do it, WHY do you want to do it?

“We have decided to do this new thing. We think it has risks. What should we to to make sure that it doesn’t have any risks. This new thing that we’ve decided to do. Without knowing what the risks are,...

View Article


Hack back, jack?

It would be the rare soul indeed, who, after spending hours or even days cleaning up from a hack, didn’t feel the strong red rage of revengeful urges. And how many PC owners or site managers, still...

View Article

We say no because that’s what you ask us to say

We’ve riffed for years on the distinction between “Dr. No” and “Mr/Ms Yes”, but many enterprises continue to back the security professional into the awkward far corner of the Business Prevention...

View Article

Everything is better with cyber on it

Gartner security analysts are being bombarded with questions about CYBER security. Is this cyber reality, or cyber hype? A few years ago, we had seriously entertained the idea of creating a sort of ‘IT...

View Article


Everything is more better with Cyber on it

I’m feeling the walls of our linguisitic purity come crashing down, battered by the waves of language evolution.  In short, I’m ready to acknowledge an increasingly popular usage, and start using the...

View Article


You have 2 weeks to pickup your cloud

You’ve got 2 weeks to get several Petabytes of data from a dissipating cloud. Will you get it all back safely? Hundreds of Nirvanix customers are asking themselves that question right now. Although...

View Article

Unknown unknowns in the Cloud

Its too bad that Dick Cheney’s awkward little epistemological speech has been so thoroughly politicized, turning an important risk management principle into an opportunity for derision.  Intelligence...

View Article

All your password are belong to us, or my heart bleeds

Change all your passwords. Now. And then do it again in a week. Of course, there’s no evidence that any passwords have been exploited, but isn’t the lack of substantive evidence a suspicious fact in...

View Article

Cloud sabotaged, all your data is permanently lost

Code Spaces, a vendor that claimed to provide secure Source Code hosting and project management support, has just been forced to admit to their customers that they’ve been sabotaged by a cyber...

View Article


Doctor, it hurts when I do this

C: we are concerned about putting our email into the cloud. J: why? C: Somebody might look at it.  J: Somebody can already look at it, even when you do host your email server in house.  SMTP is a data...

View Article

All Your Phone Books Are Belong To Us

The blogosphere and the punditerati are all in a tizzy this week with the titillating news that a major financial services firm has reported that a bunch of their services were compromised, and the...

View Article


Sony Sued For Losing Unprotectable Data

The gist of a new lawsuit against Sony is that by failing to adequately protect social security numbers, they have doomed former employees to a lifetime of credit fraud. “The class-action suit was...

View Article

“The Interview” wasn’t so bad

I put my money where my mouth was, and took my wife on a date last week. I’m sure that we were not the only people who saw The Interview out of a sense of duty.  We expected it to be a tedious and...

View Article


Are your kids ready for the SaaS puppy?

Letting the line of business get a SaaS application is like giving your kids a puppy for Christmas. Hopefully, the new pet will provide a maturing experience, in which your youngsters learn how to care...

View Article

The Great Firewall of Brussels

Visiting Beijing last week, I found a surprisingly modern and comfortable city, but I was frustrated that I couldn’t Facebook my experiences in real time, because the government blocks access to it. In...

View Article

Are you trying to negotiate terms for a bag of hot dogs?

Don’t try to spread traditional outsourcing practices over your cloud hot dog–it just won’t taste right. On a 1-to-1 basis, such as traditional outsourcing, you can negotiate any form of service or...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images