Quantcast
Channel: Security and privacy – Applied Abstractions
Browsing latest articles
Browse All 12 View Live

Image may be NSFW.
Clik here to view.

Airport insecurity

I am thinking a lot about security now, since a discussion last week on security in the 2.0 Enterprise – where the conclusion was that we need to get away from perimeter security and over towards...

View Article



Image may be NSFW.
Clik here to view.

Risky analysis

Bruce Sterling Schneier has a good article on the dangers of risk analysis when estimating software projects – and, by extension, estimating the risk of terrorist attacks. It is the everyday risks that...

View Article

Image may be NSFW.
Clik here to view.

Notes from Cory Doctorow talk in Oslo

Cory was here to launch the (New) Norwegian version of his book Little Brother, but, of course, this meeting is not as much about the book as about issues of intellectual property, DRM, legislation...

View Article

Image may be NSFW.
Clik here to view.

Computer security is about finding front doors

This excellent little piece in Wired tells about a security researchers who could spy on corporate meetings by simply scanning for conference phones with “automatic accept” configured: Using a program...

View Article

Image may be NSFW.
Clik here to view.

Norwegian Data Inspectorate outlaws Google App use

In a letter (reported at digi.no) to the Narvik Municipality (which has started to use Google Mail and other cloud-based applications, effectively putting much of its infrastructure in the Cloud) the...

View Article


Image may be NSFW.
Clik here to view.

Peter G. Neumann in New York Times

Peter G. Neumann is one of my heroes – a computer science and security expert with a sense of humor (his dry comments on the Risks Digest are legendary), inventive solutions to problems (he once built...

View Article

Image may be NSFW.
Clik here to view.

SmartHelp – geolocation for crisis situations

I am on the board of SmartHelp – a platform for crisis communication for emergency services (or, indeed, for any company that needs to locate its assets or employees in a hurry). The platform has been...

View Article

Image may be NSFW.
Clik here to view.

Notes from ACM Webinar on blockchain (etc.)

The Next Radical Internet Transformation: How Blockchain Technology is Transforming Business, Governments, Computing, and Security Models Speaker: Mark Mueller-Eberstein, CEO & Founder at Adgetec...

View Article


Image may be NSFW.
Clik here to view.

On videoconferencing and security

Picture: Zoom Yesterday began with a message from a business executive who was concerned with the security of Zoom, the video conferencing platform that many companies (and universities) have landed...

View Article

Browsing latest articles
Browse All 12 View Live




Latest Images