Back Doors Always Become Open Doors
okt 6,
2014
We know back doors get built into systems because sooner or later they’re abused in ways that often grab our attention. Keep in mind that any ”password recovery” system accomplishes something that would not be possible within a system that really protects confidentiality. There is a tradeoff between confidentiality and availability. The stronger the protection […]
Security From The Clouds To Orbit
sep 16,
2014
Last month I wrote about some current cybersecurity concerns about satellite ground stations. That may seem rather exotic to many readers, but all of us rely on reasonably accurate weather predictions. Satellite cybersecurity problems would hurt all of us, but we can draw useful lessons from this episode. The U.S. Commerce Department’s Inspector General is […]
Don’t Let BYOD Stand For ”Bring Your Own Disaster.”
jul 21,
2014
BYOD or Bring Your Own Device is popular with users because they can use familiar systems which they chose. It’s popular with management because it can reduce hardware expenses. Let the employees buy the equipment, they figure. But this reduction in capital cost can lead to an increase in operational cost when the largely uncontrolled […]
What’s New?
okt 15,
2013
I had the great pleasure of watching someone else teach the Introduction to Security course a week ago. Steve Bibby – an excellent instructor from the UK – taught the course and I assisted him because we had a large number of online participants (Learning Tree courses can have both in-room and online participants in […]
BYOD? I Hope You Didn’t Really Want That Data
sep 19,
2013
Last week I talked about the importance of being able to get your data out of the cloud. After all, that’s an aspect of availability. Earlier this year I passed along the news from Symantec’s State of Information Report that more and more data is being stored ”outside the firewall”. Some people will say ”Well, […]