Aug. 29, 2008
Internet Threat Level Red
Dan Kaminsky warns DEFCON that half the internet remains completely exposed to a gaping hole in the Domain Name System that lets phishers divert web and email traffic at will.
July 13, 2005
Too Many Security Startups?
A night out at the movies demonstrates how easily hackers adapt.
Oct. 15, 2009
The Fallacy of the Fallacy of Identity Theft
When a Wall St. Journal column recklessly dismisses Identity Theft as a hoax, the victims speak up.
May 24, 2008
An Open Letter to Ron Lieber
Experian lies about Lifelock, and fools the New York Times.
An Open Letter to Ron Lieber
Experian lies about Lifelock, and fools the New York Times.
Nov. 18, 2006
Preventing Identity Theft
The brittle secret of U.S. social security numbers has cracked.
Sept. 16, 2009
Physical Encryption: The Ultimate ID Theft Defense
My father teaches my son the Sledgehammer Algorithm, an asymmetrical encryption protocol.
October 9, 2007
SaaSy Security Suits SMB
Small businesses are now forced to play security catch up, but with fewer or no IT professionals, ease of deployment and integration trump best-of-breed technology.
August 10, 2007
SPIT and SPAM
As a guest on Talk of the Nation, I predict that we'll soon find ourselves drowning in SPIT.
The brittle secret of U.S. social security numbers has cracked.
Sept. 16, 2009
Physical Encryption: The Ultimate ID Theft Defense
My father teaches my son the Sledgehammer Algorithm, an asymmetrical encryption protocol.
October 9, 2007
SaaSy Security Suits SMB
Small businesses are now forced to play security catch up, but with fewer or no IT professionals, ease of deployment and integration trump best-of-breed technology.
August 10, 2007
SPIT and SPAM
As a guest on Talk of the Nation, I predict that we'll soon find ourselves drowning in SPIT.
Sept 11, 2009
Security icon Ron Rivest looks to Tilera's 64-core machine to run his latest cryptographic algorithm MD6.
March 12, 2008
Red Herring Interview on Security and VC Blogging
July 14, 2005
Doomsday Hackers and Evildoing Robots
Security myths that banks succumb to, and why out-of-band authentication of transactions offers the best hope of restoring online trust.
March 29, 2006
Cat and Mouse
Will the cat and mouse game between hackers and security researchers persist forever?
Aug. 1, 2005
CiscoGate at DEFCON
Cisco makes the mistake of trying to hide the first major vulnerability discovered in its IOS.
Oct. 5, 2007
There Once Was A Founder Named Scott...
A marriage toast for Postini and Google.
Nov. 2, 2006
British Telecom Dials Up Da Vinci Code
BT acquires Counterpane, and Europe goes ga-ga for Bruce Schneier.
July 17, 2005
My Security Anti-Road Map
How I try to avoid failing startups in data security.
Dec. 19, 2005
Profiling: New Approach to Desktop Security
Transparency is wonderful but overloading users with information leads to WORSE security. Warning: Exception Fault 1002F4E, Stack Overwritten. OK?
No comments:
Post a Comment