NSA Contractor Arrested for Stealing Classified Information

The NSA has another contractor who stole classified documents. It’s a weird story: "But more than a month later, the authorities cannot say with certainty whether Mr. Martin leaked the information, passed them on to a third party or whether he simply downloaded them." So maybe a potential leaker. Or a spy. Or just a document collector. My guess is… Continue reading NSA Contractor Arrested for Stealing Classified Information

Microsoft Ignite: New AI Related Tools and Services Unveiled at Conference Keynote

At Microsoft’s Ignite conference in Atlanta today Microsoft announced several new tools and services that are based on their cloud intelligence platform.

read more Continue reading Microsoft Ignite: New AI Related Tools and Services Unveiled at Conference Keynote

The Future of Human-to-Technology Interaction Is Here

I had the pleasure of being one of the lucky individuals who attended Microsoft Build 2016. I use the term “lucky” because the conference sold out in less than 2 minutes. Build routinely sells out, but selling out in less than 2 minutes makes the event seem more like a rock concert than a Microsoft developer conference. Don’t get me wrong, we “Microsoft guys” are pretty cool, but selling out at the speed of a rock concert is certainly rare.

read more

Continue reading The Future of Human-to-Technology Interaction Is Here

Human Adversaries – Why Information Security Is Unlike Engineering

A common theme among information security commenters and keynotes is that infosec can and either will or should evolve to be more like structural engineering, product safety, and public health, as they have all but eliminating the risk of dying in a commercial aircraft accident or dying from polio. Why don’t we follow the same process to stop getting hacked? It would be nice if attackers were just a disease, pest, or accident that we could vaccinate, spray, or certify away. But we have intelligent, adaptive, goal-driven, human adversaries. So let’s learn from the fields that have been dealing with them for centuries. Continue reading Human Adversaries – Why Information Security Is Unlike Engineering