-
Recent Posts
Recent Comments
Archives
- August 2025
- January 2025
- December 2024
- November 2023
- August 2023
- September 2022
- June 2022
- April 2022
- January 2022
- October 2021
- September 2021
- August 2021
- July 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- June 2018
- May 2018
- January 2016
- October 2015
- February 2013
- January 2013
- April 2011
- October 2010
- September 2010
- August 2010
- February 2010
- January 2010
- October 2009
- September 2009
- April 2009
- March 2009
- November 2008
- September 2008
- August 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
Categories
Meta
Category Archives: Uncategorized
Intent
There’s a whole bunch of the IDC/RSA white paper on insider risk management that puzzles me on one level or another. “Whether the threats are accidental or deliberate, the costs are still the same.” I didn’t see much data in … Continue reading
Posted in Uncategorized
Tagged breach notification, fraud, insider threat, risk management, RSA
Leave a comment
Policy and Ethics
The excellent Grits for Breakfast posted several stories of alleged misbehavior at the Bexar County probation office, including a link to the following story from the San Antonio Current. The following passage caught my attention: According to former Bexar County … Continue reading
Data Rustler
The best thing to come out of the Texas Lege since….ever.A bill passed through the state senate increasing the penalty on hacking at the critical infrastructures we got down here Texas-way. (State jail penalty, no less.) But I’m not talking … Continue reading
Cyber
After a once over, I’m curious as to the value of the Verizon Business “Data Britches Report.” http://securityblog.verizonbusiness.com/2009/04/15/2009-dbir/ A couple questions/comments I had on the first read:1. The document really needs a glossary. It’s hard to parse the special meaning … Continue reading
Tea Risk
At the Tea Risk conference today. Heard a woman keynote all over me, until my brain sploded. Her talk was divided into two part:1. A retrospective of headlines indicate that there has been no progress in information security in the … Continue reading
Non Fiction: Risk
From Alex Roy’s The Driver: “Our second hour of 150 mph or more inspired a highly unscientific analysis of the actual danger we faced. I concocted what I called The Danger Coefficient (DC). I guessed the average NASCAR driver, in … Continue reading
Fiction
From Ed Park’s Personal Days: “Every employee would soon be required to create a new log-on password consisting of a mix of nonsequential capital letters and a three-digit prime number and a punctuation mark, and then change it once a … Continue reading
4th Quadrant
My favorite ex-quant, N. N. Taleb, outlines the 4th Quadrant. Thoroughly enjoyable, but I’m a fan. This table made sense to me:In information risk management, what sort of events are fat tailed with complex payoff? Or which are not?I’ve suspected … Continue reading
The Wisdom of Mobs
Alex mentions stock prices as a potential input into information risk assessment. I’m skeptical of the value of market driven metrics, and the collective wisdom of the market’s crowd in assessing value of an asset. The forces driving stock prices … Continue reading
Posted in Uncategorized
1 Comment
Visualize World Data Breach
38.2% of the known universe has blogged about the Verizon data breach report and how it has changed their life, and opened their eyes, busted icons and confirmed suspicions. But I looked right at the facts there, but I might … Continue reading