Category: Uncategorized

End-user security requires a shift in corporate culture

An internal culture change can help organizations put end-user security on the front burner. If an organization only addresses security once a problem arises, it’s already too late. But it’s common for companies, especially startups, to overlook security because it…

Breaches Forever!

The computer security industry is not stopping breaches. Not for lack of trying, but if you’re familiar with the myth of Sisyphus, such efforts are the definition of pointless. If this sounds strange coming from a computer security person, it…

The Equifax Breach is Not Special

The hue and cry over the Equifax hack has subsided to a dull roar. We’ve passed the stage of ‘initial reports,’ which are usually wrong, and are firmly in armchair cybersecurity pundit mode. ‘What did Equifax executives know and when…

David Axe lays the smack down

From West Point to the Pentagon Leavenworth and back down Seven years after the launch of Wikipedia – the user-edited online encyclopedia that brought the “open source” concept to the masses – the U.S. Army is still playing catch-up. The…

Goldwater-Nichols for suits

From Inside the Pentagon (subscription required): Bush administration officials are preparing an executive order for the president’s signature that calls for sweeping changes in educational programs and career development for the federal workforce so professionals in each agency with a…

Early Warning: Arkin Incoming

Many pixels have died in the flail that was yesterday’s Early Warning post and if you haven’t seen them yet go to Blackfive, LGF, CQ, Powerline, OPFOR, etc. I don’t know that it would do much good to add to…

(Global) Guerrillas in our Midst?

I was a little slow to catch this item: U.S. law enforcement and intelligence officials say they are taking steps to monitor and combat the possible spread of Islamic extremism and support for a violent holy war against the West…

Backwater Strikes Back

Via ABC: Lt. Gen. Michael D. Maples, head of the Defense Intelligence Agency, recently testified that documents captured by coalition forces during a raid of a safe house believed to house Iraqi members of al Qaeda six months ago “revealed…

Coalition of the Dastardly

(Cross posted to GroupIntel) I engaged in several conversations about cyber threats this past week and each conversant repeated with certainty a lack of concern over a relationship between terrorists and mobsters in the virtual world. I’d like to think…