Category: deep thoughts
Malware protection is easy – Malinformation protection is hard
Whenever it seems like the challenges of protecting my employer from risks to information security or business continuity are towering above me, I stop and…
Too much information?
An interesting piece in the Harvard Business Review highlights the one of the challenges information security professionals face when dealing with security awareness; we actively…
Boredom and security
We security management types would like to think that every task we give our minions is exciting and engaging. However, there are lots of security…
Can experience be a hindrance in making security decisions?
Some interesting insight from the Harvard Business Review’s January 2020 IdeaWatch section: A study looked at how people react to information which indicates that a…
Deepfakes – Welcome to the post truth society
I recently watched the New York Times’ Weekly episode “Deepfakes – Believe at Your Own Risk” and while I have been concerned about the implications…
Something about (Japanese) foxes and hen houses
Not strictly a security story, but interesting and alarming… Japanese authorities have decided that: It is permissible to make contributions to politicians using cryptocurrencies like…
Naming and shaming
So here’s a bit of an odd story… according to the Financial Times, the US Federal Reserve has publicly sanctioned an ex employee of a…
So your third party has been breached…
Another day, another third party security compromise story… this time it is Indian outsourcing giant Wipro. The firm has confirmed that a small number of…
Something’s not quite right…
Apparently, I am a man ahead of my time. While I have always sensed that there is something not quite right about the universe, scientists…
In DPRK, Linux Watches You
A presentation from this past week’s Chaos Computer Congress shows how totalitarian states (like, in this case, North Korea) can leverage open source software in…