I wrote a CERIAS blog post with Dr. Eugene Spafford on the issues surrounding the media and social implications of the exploitation and distribution of images from various celebrities. As an information security researcher I am completely blown away by…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Trans-convergence Thought Exercise
There are a few thoughts and activities going on in my life right now that are starting to pull together into a single thread. The first was Apple’s most recent keynote where they talked about iHealth as a way to…
Trans-convergence
Where is the tech world headed? Where and what will be the enterprise of the future? We are in a post-converged world swimming in a sea of devices and moving into the world of trans-convergence. Where trans refers to changing…
Research note: Strategic compression and the future of information security
In the world of strategic theory there are many pages and gallons of ink exhorting the relative merits of various historical figures thinking. I don’t discount the relative merits of Clausewitz or Sun Tzu but in each entities time their…
Threat actor zero (TA0)
When Mandiant came out with the APT1 report the world was shattered into two camps. In the first camp was a group of people who were happy to have more information on the bad guys entering their networks and doing…
Threat intelligence “know thyself”
I worry about the over use of threat intelligence. The idea of intelligence came to the information technology space in the early 1990s and many from the intelligence world and the information technology community scoffed at the idea. In the…
Response to –>Errata Security: PR will be first up against the wall when the revolution comes
Forbes.com interviews leaders on “10 Ways to Fix Cybersecurity“. It’s useless — in fact (as I’ll demonstrate below) worse than useless.The problem is that these leaders aren’t experts, they are fluff. Their technical competence extends only as far as knowing…
Strategic information security
It’s not only a good idea it is one that most people will never understand making it absolutely the next buzzword at security conventions. Strategy is often misunderstood. It simply isn’t an easy term for most people to get there…
Cyber Fratricide (CyCon CCD COE 2014 Presentation)
3 forms of cyber attribution
There are three forms of attribution: 1) Political attribution based on the actors motives and goals. 2) Technical attribution based on tactics, techniques and means of an entity. 3) Forensic attribution based on the evidence of behaviors and facts.
Comparing two stories… Dope Smoking STEM
Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana “James B. Comey said Monday that if the FBI hopes to continue to keep pace with cyber criminals, the organization may have to loosen up its no-tolerance policy for hiring those who…
Garmin iPhone application for motorcycle rallies
This is a quick description of how I use my iPhone on motorcycle rallies. I also use two BMW Navigator IV GPS but the iPhone is actually a faster processor, better GPS, and shows up better in daylight. In my…
Tools used against the enterprise Part 3
x x x x x x x x x
If the job sucks be awesome
I see a lot of discussion at hacker cons or security cons depending on your predilection that says something to the effect “I’m burned out and drink to much.” The information security community has a hidden underbelly that hangs over…
U.S. Bank of Cyber: An analysis of Cyber Attacks on the U.S. Financial System
This gallery contains 1 photo →