Security Blog

The company that I founded many years ago in California became famous for creating data security tools. Later on, I helped to create one of the most widely distributed biometric security standards in the world, and since then I have continued to work in the field of information security. In these posts I will focus on the theme of “security,” not only in the limited sense of contemporary IT security, but as part of a broader concept of risk management that is visible throughout history and across the natural world.


Top corporate security threats

External hackers attacking your systems’ availability Security defects/vulnerabilities in hardware and software External hackers attacking your corporate information Employee errors in software and computer use Employee actions that are intentionally harmful Natural disasters Theft of physical assets Unauthorized wireless network access Terrorism (N=294 / Source: Gartner 2005)


The future of security

As the original designer/developer of the internet, the U.S. Department of Defense is on the cutting edge of ICT. Many of these connected systems will require greater security protocols. Eventually, these technologies will trickle down into commercial implementations. The following examples would be the latest evolution in communications and information security. Joint Tactical Radio System (JTRS) Global Information Grid (GIG) Good document on “A History of U.S. Communications Security” by the NSA (declassified) My friend, Mark Anderson, also publishes a popular newsletter called the Strategic News Service, which caters to the technology and ICT community. He was recently interviewed on


Dilbert on security

I’ve always been a fan of Dilbert. Scott Adams actually does a really good job of portraying real world security in the workplace.

Leave a Reply

Your email address will not be published. Required fields are marked *