Security Blog

The company that I founded many years ago in California became famous for creating data security tools. Later on, I helped to create one of the most widely distributed biometric security standards in the world, and since then I have continued to work in the field of information security. In these posts I will focus on the theme of “security,” not only in the limited sense of contemporary IT security, but as part of a broader concept of risk management that is visible throughout history and across the natural world.

Top corporate security threats

External hackers attacking your systems’ availability Security defects/vulnerabilities in hardware and software External hackers attacking your corporate information Employee errors in software and computer use Employee actions that are intentionally harmful Natural disasters Theft of physical assets Unauthorized wireless network access Terrorism (N=294 / Source: Gartner 2005)

Posted in Blog, Security | Tagged , , | Leave a comment

The future of security

As the original designer/developer of the internet, the U.S. Department of Defense is on the cutting edge of ICT. Many of these connected systems will require greater security protocols. Eventually, these technologies will trickle down into commercial implementations. The following examples would be the latest evolution in communications and information security. Joint Tactical Radio System

Posted in Blog, Security | Tagged , , | Leave a comment

Dilbert on security

I’ve always been a fan of Dilbert. Scott Adams actually does a really good job of portraying real world security in the workplace.

Posted in Blog, Security | Tagged , | Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Do NOT follow this link or you will be banned from the site!