Tag Archives: security

SSL Is Broken, Time to Fix It

For a long time, I have felt that SSL/TLS – the protocol that secures your communications with Web sites, mail servers and most everything across the Internet –  is broken. It is broken to the point that it is fundamentally insecure, except … Continue reading

Posted in business, cloud, security, technology | Tagged , , , , | Comments Off on SSL Is Broken, Time to Fix It

Why the Internet of Things Is So Vulnerable

It seems every day there is another article about how “vulnerable” the Internet of Things (IoT) is. Here are two choice excerpts from the last year: “Hackers Remotely Kill a Jeep on the Highway,” Wired, 21st July 2015 “Security Researcher … Continue reading

Posted in business, cloud, product, security, technology | Tagged , , , , , | Comments Off on Why the Internet of Things Is So Vulnerable

Keep Corporate Away From Production

For a very long time, corporations treated their corporate networks as safe protected environments. The data and applications inside that network are: confidential and must be kept safe from unauthorized access (protect from loss), and crucial to business processes and must … Continue reading

Posted in business, cloud, policy, security, technology | Tagged , , , | Comments Off on Keep Corporate Away From Production

TrueCrypt: True Security, True Licensing

TrueCrypt was a great open-source encryption program. It created files that, when opened by the program, looked to your computer like an additional drive. Any files placed in that drive would be encrypted and protected from prying eyes. Why would you do … Continue reading

Posted in business, cloud, policy, product, security, technology | Tagged , , , , | Comments Off on TrueCrypt: True Security, True Licensing

Experience Matters… Especially In a Startup

There is a belief in startup-land that you have to be younger than ___ to successfully innovate. To some extent, that is driven by the youth of the founders of a few highly successful companies like Facebook and Twitter, magnified by the … Continue reading

Posted in business, policy, product, security, technology | Tagged , , , , | Comments Off on Experience Matters… Especially In a Startup

Hiding Fingerprints in Your Browser for Privacy

The browser is the single most ubiquitous piece of software on the planet. Nearly every computing device has at least one one. Because of its ubiquity, and its use across multiple applications from open (Google “how much does a banana … Continue reading

Posted in business, cloud, security, technology | Tagged , , , , | Comments Off on Hiding Fingerprints in Your Browser for Privacy

Samsung’s “Too Smart for Their Own Good” TVs

The Internet has been abuzz for the last week about a hitherto little-known clause in Samsung’s “Smart TV” privacy policy. The news was most prominently covered in the Daily Beast, here. The Daily Beast includes a link to the entire privacy … Continue reading

Posted in business, cloud, policy, security, technology | Tagged , , , , , , , , , | Comments Off on Samsung’s “Too Smart for Their Own Good” TVs

Deleting Email Is a Chimera

In response to the Sony hack, in which not only valuable intellectual property, such as movies, was stolen, but also (previously) confidential emails, a number of experts have recommended increasing the usage of email retention policies. They go something like … Continue reading

Posted in business, policy, security, technology | Tagged , , , | Comments Off on Deleting Email Is a Chimera

Ask Why You Care About Security

Recently, I had a conversation with a senior executive at a company about the firm’s information security. The conversation, like others I have had, revolved around a sudden increase in interest in that security. To be clear, we are not talking … Continue reading

Posted in policy, security, technology | Tagged , , , , | Comments Off on Ask Why You Care About Security

Security Spending: Part II, the Good Tower

Today, we present the second guest post in the series by Ted Lloyd, editor of OnlineCISO. Yesterday, we explored why security spending need not be a bottomless pit, and how yesterday’s tools, such as antivirus, can be evaluated using familiar risk management methodologies. Where … Continue reading

Posted in business, security, technology | Tagged , , , | Comments Off on Security Spending: Part II, the Good Tower