This article is reporting that the demand for Chief Information Security Officers far exceeds supply: Sony and every other company that realizes the need for a strong, senior-level security officer are scrambling to find talent, said Kris Lovejoy, general manager of IBM’s security service and former IBM chief security officer. CISOs are “almost impossible to … Read More “Not Enough CISOs to Go Around” »
Author: infossl
Interesting article: “How terrorism fears are transforming America’s public space.” I am reminded of my essay from four years ago: “Close the Washington Monument.” Powered by WPeMatico
The Intercept has published an article — based on the Snowden documents — about AURORAGOLD, an NSA surveillance operation against cell phone network operators and standards bodies worldwide. This is not a typical NSA surveillance operation where agents identify the bad guys and spy on them. This is an operation where the NSA spies on … Read More “NSA Hacking of Cell Phone Networks” »
Government surplus. Only $8,000 on eBay. Note that this device has been analyzed before. Powered by WPeMatico
Last week, we learned about a striking piece of malware called Regin that has been infecting computer networks worldwide since 2008. It’s more sophisticated than any known criminal malware, and everyone believes a government is behind it. No country has taken credit for Regin, but there’s substantial evidence that it was built and operated by … Read More “Corporate Abuse of Our Data” »
There has been an increase in squid poaching by North Korea out of Japanese territorial waters. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Funny. Powered by WPeMatico
In the Internet age, we have no choice but to entrust our data with private companies: e-mail providers, service providers, retailers, and so on. We realize that this data is at risk from hackers. But there’s another risk as well: the employees of the companies who are holding our data for us. In the early … Read More “Corporations Misusing Our Data” »
The Denver police are using olfactometers to measure the concentration of cannabis in the air. I haven’t found any technical information about these devices, their sensitivity, range, etc. Powered by WPeMatico
This talk (and paper) describe a lattice-based public-key algorithm called Soliloquy developed by GCHQ, and a quantum-computer attack on it. News article. Powered by WPeMatico