Skip to content

{ Monthly Archives } July 2013

The Blurry Line of Marketing Funded Research

Microsoft’s Security Engineering Center recently published a document called Software Vulnerability Exploit Trends. In reading it, I was confronted with a familiar feeling, a mix of interest and frustration that I’ll just call frustinterest. I was totally frustrinterested in this document. It had charts like this one. I really want to love this chart. It’s […]

New Fox Series: When Clouds Go Bad!

Here’s the scenario: you’re a nefarious attacker and you want to compromise some boxes, install your malware and run a little (or huge) botnet. There are plenty of malware and botnet options for you to choose from, but you still need a few things. You need some internet connected storage on which to host the […]

Hanlon’s Razor and Government Spying

Hanlon’s Razor says “Never attribute to malice that which is adequately explained by stupidity.” There’s a lot of content out in the world on the NSA, government spying and Snowden. *A lot* of content. There was a sentence in this blog post that stood out to me, primarily because someone tweeted it. “[I]f we ever […]

Personal Marketing Checklist

Seth Godin lays out some principles for media moguls here. They’re interesting, and interesting to read, but hard to apply at the moment of media interaction, i.e. just before clicking ‘publish’ or ‘post.’ I thought I’d attempt to translate them to a sort of personal marketing checklist. Is this the truth? Is this content or […]

Understanding Intent and Control – When Defaults Attack

Article “A Japanese ministry is conducting an internal investigation after a Google Groups account used for international treaty negotiations was left on its default, publicly viewable settings.” It’s tempting to say that Google should change the defaults to be more secure. Security professionals understand the default-deny stance really well, but there are other perspectives to […]