Peter G. Neumann on Cloud Risks
Anyone with a stake in the overall success of cloud computing should take a few minutes to read the recent NYT interview with Peter G. Neumann, a highly-respected computer security researcher who, now...
View ArticleThat Christmas Kindle has Strings Attached
We’ve recently moved house, and my collection of books, many of them heavily marked up with multi-colored highlights, Post-Its, and bookmarks, remains something of a storage issue. Over the last...
View ArticleHow Valuable are Annotations
Today’s library user takes electronic catalogs for granted. Being able to remotely search the contents of a library is not only convenient, but it also allows for a tighter integration between the...
View ArticleCruise Ships and Cloud Computing
As 4,200 disgruntled holiday goers, trapped on the ironically named cruise ship Triumph, finally end their 5 day ordeal, it serves as a reminder that the eggs can have more stake in the state of the...
View ArticleIf you don’t know how to do it, WHY do you want to do it?
“We have decided to do this new thing. We think it has risks. What should we to to make sure that it doesn’t have any risks. This new thing that we’ve decided to do. Without knowing what the risks are,...
View ArticleHack back, jack?
It would be the rare soul indeed, who, after spending hours or even days cleaning up from a hack, didn’t feel the strong red rage of revengeful urges. And how many PC owners or site managers, still...
View ArticleWe say no because that’s what you ask us to say
We’ve riffed for years on the distinction between “Dr. No” and “Mr/Ms Yes”, but many enterprises continue to back the security professional into the awkward far corner of the Business Prevention...
View ArticleEverything is better with cyber on it
Gartner security analysts are being bombarded with questions about CYBER security. Is this cyber reality, or cyber hype? A few years ago, we had seriously entertained the idea of creating a sort of ‘IT...
View ArticleEverything is more better with Cyber on it
I’m feeling the walls of our linguisitic purity come crashing down, battered by the waves of language evolution. In short, I’m ready to acknowledge an increasingly popular usage, and start using the...
View ArticleYou have 2 weeks to pickup your cloud
You’ve got 2 weeks to get several Petabytes of data from a dissipating cloud. Will you get it all back safely? Hundreds of Nirvanix customers are asking themselves that question right now. Although...
View ArticleUnknown unknowns in the Cloud
Its too bad that Dick Cheney’s awkward little epistemological speech has been so thoroughly politicized, turning an important risk management principle into an opportunity for derision. Intelligence...
View ArticleAll your password are belong to us, or my heart bleeds
Change all your passwords. Now. And then do it again in a week. Of course, there’s no evidence that any passwords have been exploited, but isn’t the lack of substantive evidence a suspicious fact in...
View ArticleCloud sabotaged, all your data is permanently lost
Code Spaces, a vendor that claimed to provide secure Source Code hosting and project management support, has just been forced to admit to their customers that they’ve been sabotaged by a cyber...
View ArticleDoctor, it hurts when I do this
C: we are concerned about putting our email into the cloud. J: why? C: Somebody might look at it. J: Somebody can already look at it, even when you do host your email server in house. SMTP is a data...
View ArticleAll Your Phone Books Are Belong To Us
The blogosphere and the punditerati are all in a tizzy this week with the titillating news that a major financial services firm has reported that a bunch of their services were compromised, and the...
View ArticleSony Sued For Losing Unprotectable Data
The gist of a new lawsuit against Sony is that by failing to adequately protect social security numbers, they have doomed former employees to a lifetime of credit fraud. “The class-action suit was...
View Article“The Interview” wasn’t so bad
I put my money where my mouth was, and took my wife on a date last week. I’m sure that we were not the only people who saw The Interview out of a sense of duty. We expected it to be a tedious and...
View ArticleAre your kids ready for the SaaS puppy?
Letting the line of business get a SaaS application is like giving your kids a puppy for Christmas. Hopefully, the new pet will provide a maturing experience, in which your youngsters learn how to care...
View ArticleThe Great Firewall of Brussels
Visiting Beijing last week, I found a surprisingly modern and comfortable city, but I was frustrated that I couldn’t Facebook my experiences in real time, because the government blocks access to it. In...
View ArticleAre you trying to negotiate terms for a bag of hot dogs?
Don’t try to spread traditional outsourcing practices over your cloud hot dog–it just won’t taste right. On a 1-to-1 basis, such as traditional outsourcing, you can negotiate any form of service or...
View Article
More Pages to Explore .....