Category Archives: Information Security

Revisiting “Security Biodiversity”

In the second half of 2003, Dan Geer, Becky Bace, Bruce Schneier, and several other well-known security personalities co-authored a paper entitled “CyberInsecurity: The Cost of Monopoly“. Back in those days, ...

Continue Reading....

Revisiting “Security Biodiversity”

In the second half of 2003, Dan Geer, Becky Bace, Bruce Schneier, and several other well-known security personalities co-authored a paper entitled “CyberInsecurity: The Cost of Monopoly“. Back in those days, ...

Continue Reading....

My Thoughts on Security Scoreboard

There’s been a lot of buzz in the last few weeks about Security Scoreboard, a site I have volunteered to work with as it goes through a bit of an ...

Continue Reading....

My Thoughts on Security Scoreboard

There’s been a lot of buzz in the last few weeks about Security Scoreboard, a site I have volunteered to work with as it goes through a bit of an ...

Continue Reading....

Log Management…and Beyond

Log management is one of those topics that is hard to make “sexy” or exciting. Logs are, after all, well…logs. However, I think the log management industry has reached a ...

Continue Reading....