Uncategorized

09.12.16

The Decision Chain

by

When a teenager wants to drive. As a parent of a teen, this is not a hypothetical question to me but one that is here and now. And the decision of whether or not to let her drive are based on some strict decision criteria. What are they? 1. What group does she belong to? […]

Read More

06.03.16

The password is dead! Long live the password!

by

Donald E. Malloy from LSExperts gave a fascinating talk at ICMC 2016 about passwords and technology that exists and is being developed to replace them. This blog covers some of the topics he covered together with my own analysis. As time goes by we continue to hear about major data breaches and end customers are […]

Read More

05.03.16

Multi-factor & Other Changes in PCI-DSS 3.2

by

Once again PCI-DSS is being rev’ed, this time to PCI-DSS 3.2. PCI-DSS 3.1 will retire in October, 2016. The good news is that PCI is mature and the basics have not changed. The fundamental ideas are to build and maintain secure network and systems, protect cardholder data, maintain a vulnerability management program, implement strong access […]

Read More

04.21.16

The Results are In – Our First SDDC Study

by

In a way, it is like a perfect storm where a number of different factors come together to help drive a larger trend. In this case it is looking like 2016 will be the year of the Software Defined Data Center as increased adoption is driven by faster deployment, better ROI and better ways of […]

Read More

04.19.16

The Future of Defense Innovation

by

The world of defense has certainly changed over the past 40 years. We have shifted paradigms – it used to be all about fielding as many pieces of armor as possible in preparation for a nuclear Ragnarok on the plains of Europe. With efforts directed at taking and holding the highest ground, space, Reagan’s SDI […]

Read More

04.11.16

Cloud Security Myths with David Spark of CIO.com

by

“The biggest myth, which refuses to die, is that your data is not safe in the cloud,” argued Orlando Scott-Cowley (@orlando_sc), cyber-security specialist, Mimecast. “We’re still dealing with the legions of server huggers who claim their data is safer on their own networks, where they can feel the cold embrace of the tin of their servers […]

Read More

04.11.16

Encryption – What if it was about more than just money?

by

Sure, money is pretty important to many of us, but there are at least some things that to at least some people that are at least sometimes more important. Things like family, life, freedom and the like. One of the latest infosec scandals, the Panama Papers, 11.5 million documents, 2.6 terabytes of data, are a […]

Read More

04.07.16

Is it Possible to Protect My Personal Information Online

by

Recently I was on San Francisco’s KTVU Tech Tuesday dealing with the question of whether or not a regular consumer can protect their personal data online. The short answer is that you can take certain steps to make things more secure, but that in the end there is no 100% way of keeping uploaded data […]

Read More

04.01.16

Guard Rails

by

In Silicon Valley we are blessed with not only tremendous diversity (what’s for lunch? Thai? Ethiopian? Japanese? Greek?) but also tremendous natural beauty as well. San Jose, at the southern end of the valley, features a really cool spot, the Lick Observatory at the top of Mt. Hamilton. The observatory, which opened in 1888, features […]

Read More