Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 161 by Richard Veryard tagged security

Washington, D.C., Feb. 3, 2011 — The Securities and Exchange Commission today charged three AXA Rosenberg entities with securities fraud for concealing a significant error in the computer code of the quantitative investment model that they use to manage client assets. The error caused $217 million in investor losses.

Share It With Others!

There is another danger we need to be aware of too: the symmetry of self-interest between the would-be bombers and the security services assembled to stop them.

Share It With Others!

Share It With Others!

After a consultant performed a security assessment for a client, he was rehired a few months later to examine his client's progress. Here's what he found when he took a look at the client's approach to passwords and the corrections he had to make. http://www.techrepublic.com/article/when-a-best-practice-isnt-best-for-your-organization/

Share It With Others!

n the United States, the concept of "expectation of privacy" matters because it's the constitutional test, based on the Fourth Amendment, that governs when and how the government can invade your privacy. The problem is, in today's information society, that definition test will rapidly leave us with no privacy at all.

Share It With Others!

TSA has stopped some bad guys. But we can't know for sure whether stopping bad guys is just the excuse it uses to serve its larger driving mission, which is to bolster its own budget, public prestige, and power

Share It With Others!

Beet armyworm caterpillars react to the sound of a passing wasp by freezing in place, or even dropping off the plant. Unfortunately, armyworm intelligence isn't good enough to tell the difference between enemy aircraft (the wasps that prey on them) and harmless commercial flights (bees); they react the same way to either. So by producing pollen for bees, plants not only get pollinated, but also gain some protection against being eaten by caterpillars.

Share It With Others!

I am of the opinion that many of Infosec's ills begin and end with the failure to see relationships and instead pass off binary notions of secure/insecure with silver bullet "solutions".

Share It With Others!

One of the standard software security prescriptions for the SDLC is to data classification and enforce least privilege. From a security perspective this sounds fantastic, especially on a whiteboard. When the rubber meets the real world road, things often turn out slightly different. It turns out that it is hard to conduct business with excessive granularity.

Share It With Others!

Rules pertaining to government need to be different, because of the power differential. Subjecting the president's communications to eventual public review increases liberty because it reduces the government's power with respect to the people. Subjecting our communications to government review decreases liberty because it reduces our power with respect to the government.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT