Tips for Successful Zero-Trust Implementation

“Never trust, always verify” is a solid security concept — but it’s important to realize that putting it into practice can be complex. Continue reading Tips for Successful Zero-Trust Implementation

Excellent Analysis of the Boeing 737 Max Software Problems

This is the best analysis of the software causes of the Boeing 737 MAX disasters that I have read. Technically this is safety and not security; there was no attacker. But the fields are closely related and there are a lot of lessons for IoT security — and the security of complex socio-technical systems in general — in here. EDITED… Continue reading Excellent Analysis of the Boeing 737 Max Software Problems

CyCon 2018, Thomas Dullien’s ‘Security, Moore’s Law, And The Anomaly Of Cheap Complexity’

Quite likely, the most imnportant meida discussing hardware security, computer science, and complexity escalation you may view today (if you are interested in that sort of thing, that is). Slides available.
Permalink
The post CyCon 2018, Thomas Dulli… Continue reading CyCon 2018, Thomas Dullien’s ‘Security, Moore’s Law, And The Anomaly Of Cheap Complexity’

Becca Rick’s ‘How Paypal Shares Your Data’

Rebecca (Becca) Rick’s has published a highly informative interactive graphic (along with the data source) detailing the Paypal data sharing efforts, in which, your data is published to a multitude of said entities. Astonishing.
Folks, the easiest met… Continue reading Becca Rick’s ‘How Paypal Shares Your Data’

Becca Rick’s ‘How Paypal Shares Your Data’

Rebecca (Becca) Rick’s has published a highly informative interactive graphic (along with the data source) detailing the Paypal data sharing efforts, in which, your data is published to a multitude of said entities. Astonishing.
Folks, the easiest met… Continue reading Becca Rick’s ‘How Paypal Shares Your Data’