Category Archives: Uncategorized

Intent

There’s a whole bunch of the IDC/RSA white paper on insider risk management that puzzles me on one level or another. “Whether the threats are accidental or deliberate, the costs are still the same.” I didn’t see much data in … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Policy and Ethics

The excellent Grits for Breakfast posted several stories of alleged misbehavior at the Bexar County probation office, including a link to the following story from the San Antonio Current. The following passage caught my attention: According to former Bexar County … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Data Rustler

The best thing to come out of the Texas Lege since….ever.A bill passed through the state senate increasing the penalty on hacking at the critical infrastructures we got down here Texas-way. (State jail penalty, no less.) But I’m not talking … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Cyber

After a once over, I’m curious as to the value of the Verizon Business “Data Britches Report.” http://securityblog.verizonbusiness.com/2009/04/15/2009-dbir/ A couple questions/comments I had on the first read:1. The document really needs a glossary. It’s hard to parse the special meaning … Continue reading

Posted in Uncategorized | Tagged , , , | 2 Comments

Tea Risk

At the Tea Risk conference today. Heard a woman keynote all over me, until my brain sploded. Her talk was divided into two part:1. A retrospective of headlines indicate that there has been no progress in information security in the … Continue reading

Posted in Uncategorized | Tagged , , | 1 Comment

Non Fiction: Risk

From Alex Roy’s The Driver: “Our second hour of 150 mph or more inspired a highly unscientific analysis of the actual danger we faced. I concocted what I called The Danger Coefficient (DC). I guessed the average NASCAR driver, in … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Fiction

From Ed Park’s Personal Days: “Every employee would soon be required to create a new log-on password consisting of a mix of nonsequential capital letters and a three-digit prime number and a punctuation mark, and then change it once a … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

4th Quadrant

My favorite ex-quant, N. N. Taleb, outlines the 4th Quadrant. Thoroughly enjoyable, but I’m a fan. This table made sense to me:In information risk management, what sort of events are fat tailed with complex payoff? Or which are not?I’ve suspected … Continue reading

Posted in Uncategorized | Tagged | 1 Comment

The Wisdom of Mobs

Alex mentions stock prices as a potential input into information risk assessment. I’m skeptical of the value of market driven metrics, and the collective wisdom of the market’s crowd in assessing value of an asset. The forces driving stock prices … Continue reading

Posted in Uncategorized | 1 Comment

Visualize World Data Breach

38.2% of the known universe has blogged about the Verizon data breach report and how it has changed their life, and opened their eyes, busted icons and confirmed suspicions. But I looked right at the facts there, but I might … Continue reading

Posted in Uncategorized | Tagged , , , | 1 Comment