The company that I founded many years ago in California became famous for creating data security tools. Later on, I helped to create one of the most widely distributed biometric security standards in the world, and since then I have continued to work in the field of information security. In these posts I will focus on the theme of “security,” not only in the limited sense of contemporary IT security, but as part of a broader concept of risk management that is visible throughout history and across the natural world.
External hackers attacking your systems’ availability Security defects/vulnerabilities in hardware and software External hackers attacking your corporate information Employee errors in software and computer use Employee actions that are intentionally harmful Natural disasters Theft of physical assets Unauthorized wireless network access Terrorism (N=294 / Source: Gartner 2005)
As the original designer/developer of the internet, the U.S. Department of Defense is on the cutting edge of ICT. Many of these connected systems will require greater security protocols. Eventually, these technologies will trickle down into commercial implementations. The following examples would be the latest evolution in communications and information security. Joint Tactical Radio System …
I’ve always been a fan of Dilbert. Scott Adams actually does a really good job of portraying real world security in the workplace.