Author Archives: dutcherstiles

Charts ‘n Graphs

From Pogo, this article from Physorg on the classic Evil Hacker v. Evil Suit dilemma. From the article: If Phil Howard’s calculations prove true, by year’s end the 2 billionth personal record – some American’s social-security or credit-card number, academic … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

SSN Panic, Texas Style

Here’s the Computerworld run-down. And here’s the Attorney General’s letter (worth reading) and the proposed bill to change the law Texas HB 2061 so as all the county clerks don’t get thrown in jail. The AG letter says it in … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Learn to Play Sonic Reducer

I was going to write about this article on Dark Reading, that includes this power-quote of insight and mind-blowitude: “A lot of blogs now have become very big on the Internet,” noted OSC Director Douglas Naquin in an interview with … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

It’s the Crime, Not the Tool

Tim Wilson at Dark Reading on IT Security: The New Big Brother: “To identify potential insider threats, IT must monitor end users’ behavior by scanning email, tracking network activity, and even watching employees for “trigger” events that might cause disgruntlement. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Privacy and Security Lessons from Criminal Enterprises: The Corner & PCI

Either you have heard the stories, or encountered first hand the difficulty in convincing an organization’s leaders to take adequate precautions to insure the privacy of identity related data, and maintain the integrity, confidentiality and availability of their information assets. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Impacted Molars: Insurance, Banks and Godzilla

A Risk Management & Assessment Deathmatch Gunnar Peterson’s interpretation of Warren Buffet’s risk management. vs. The Bank Lawyer’s outstanding post on bank risk managers and regulatorsvs. Alex’s Godzilla pandemic risk deflation.

Posted in Uncategorized | Leave a comment

One, but he gets 3 hours credit.

The official TAMU account of a hack into their authentication system. The Eagle has the most entertaining coverage of Aggie Hack 07. “We learn from our mistakes,” said Pierce Cantrell, vice president andassociate provost for information technology. “These are complicatedsystems, … Continue reading

Posted in Uncategorized | Leave a comment

Privacy & Security Sing-a-long: Monster Hospital

(Medical privacy sing-a-long with Metric) Monster hospital, can you please release me? You hold my hands down, I’ve been bad. You hold my arms down, I’ve been bad. I’ve been bad, I’ve been bad.I fought the war but the war … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Impacted Molars: Misguided Ninja Dudes and PCI Awareness

MESIALDark Reading continues its obsession with physical security:Network dude rassels potential bad guy, followed by a stern warning on what a scary world it is out there, cause physical attacks hurt.Forgive me if I’m out of line, but why would … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Everyday Privacy and Security: The Drug Store

After a conversation with a friend, I thought I’d cite some examples of how privacy and security impact day-to-day life. Here’s the first in the series; though I admit, dissecting the CMEA would take more effort than I have time … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment