premediation.blogspot.com
Premediation: February 2011
http://premediation.blogspot.com/2011_02_01_archive.html
In which i attempt to think through the concept of premediation on the fly. Wednesday, February 23, 2011. Are Recent Protests Test Performances for Social Media? Were the mass protests-turned-revolt in Egypt inspired by mobile, social media? Two events I witnessed/participated in can help elucidate the way in which the protests work as test performances. The first occurred last Saturday, where Nathaniel Stern and I watched a small group of Tea Partiers try to provoke a union leader and union supporte...
securance.blogspot.com
Securance: July 2012
http://securance.blogspot.com/2012_07_01_archive.html
The action or means of securing; assurance, security. Monday, July 30, 2012. Is an interesting article. It is not about a hack in the 'OMG PWNED LULZ! Tradition. It's about a subtle deception. The 'attackers' - Anonymous most likely but it could have been anybody - spoofed the NY Times website:. The article appeared on a web page built to replicate the Times' popular website, right down to perfectly working links to the rest of the site. Information operations include changing your adversary's perception.
securance.blogspot.com
Securance: Subtlety is Key
http://securance.blogspot.com/2012/07/subtlety-is-key.html
The action or means of securing; assurance, security. Monday, July 30, 2012. Is an interesting article. It is not about a hack in the 'OMG PWNED LULZ! Tradition. It's about a subtle deception. The 'attackers' - Anonymous most likely but it could have been anybody - spoofed the NY Times website:. The article appeared on a web page built to replicate the Times' popular website, right down to perfectly working links to the rest of the site. Information operations include changing your adversary's perception.
securance.blogspot.com
Securance: May 2008
http://securance.blogspot.com/2008_05_01_archive.html
The action or means of securing; assurance, security. Thursday, May 1, 2008. I've always been fascinated by TEMPEST, even before I read Cryptonomicon. Today, Wired has a blog entry. Discussing a recently-declassified NSA paper. Subscribe to: Posts (Atom). A security nerd who likes to write. This blog is a collection of thoughts. Some of these thoughts support a course I teach; none should be construed as to be those of my employer. View my complete profile. Interesting People and Places.
securance.blogspot.com
Securance: Format vs. Wipe
http://securance.blogspot.com/2012/06/format-vs-wipe.html
The action or means of securing; assurance, security. Saturday, June 30, 2012. Format vs. Wipe. I thought that the differences between a drive reformat and a drive wipe were well known, but apparently they are not:. Is the deletion/overwriting of the file table and data structures that allow an operating system to find things (files) on the hard drive. Wiping a drive -. Is the destruction of all data on a drive by writing a pattern of 0's, 1's or both to every sector on that drive. If I were to reformat.
securance.blogspot.com
Securance: The Original OODA Loop
http://securance.blogspot.com/2012/06/original-ooda-loop.html
The action or means of securing; assurance, security. Friday, June 22, 2012. The Original OODA Loop. Subscribe to: Post Comments (Atom). A security nerd who likes to write. This blog is a collection of thoughts. Some of these thoughts support a course I teach; none should be construed as to be those of my employer. View my complete profile. Format vs. Wipe. The Original OODA Loop. Interesting People and Places.
securance.blogspot.com
Securance: June 2012
http://securance.blogspot.com/2012_06_01_archive.html
The action or means of securing; assurance, security. Saturday, June 30, 2012. Format vs. Wipe. I thought that the differences between a drive reformat and a drive wipe were well known, but apparently they are not:. Is the deletion/overwriting of the file table and data structures that allow an operating system to find things (files) on the hard drive. Wiping a drive -. Is the destruction of all data on a drive by writing a pattern of 0's, 1's or both to every sector on that drive. If I were to reformat.
thirddefense.wordpress.com
CSO Tools Series | Third Defense Blog
https://thirddefense.wordpress.com/cso-tools-series
Building Secure Web Apps. Blog categories are nice but a dedicated page to navigate the Magnificent 7 series on CSO tools is even better. As we share our experiences across other security processes, we’ll continue to grow this list. Comments and feedback encouraged. There are many ways to run a program. We’re working hard to help you build the most efficient. 3/7 Risk and Investment Justification. 4/7 Security Service Catalog. 5/7 Know Your Role (RACI). 7/7 Metrics and Scorecards. Enter your comment here.
SOCIAL ENGAGEMENT