Worst executive behavior of the month award

For my Israeli readers – הדבר היחיד שיותר גרוע מלהיות לא רציני זה לצאת פרייר. I’m collecting data for a couple of articles on data security in social networks and ad-hoc mobile networks so I’ve been a little slow on blogging lately – so I’m down to general management and risk management stuff. I think […]

Night walking on the freeway

Ian Fleming once remarked how American road signs were so sexy – “winding curves” and “soft shoulders”. I was thinking of Ian Fleming  taking an unexpected 5K walk at night on the shoulders of a 6 line freeway. Last night I was driving my daughter’s car on Route 6.   There was a leak in the […]

UK gets serious in the war on corruption

David Benyon from Op Risk and Compliance magazine reports A new bribery and corruption legislation will be put before the UK parliament. Doing business using bribery would mean jail for a decade under the bill. “The new Bribery Bill will make it far easier for companies and senior management to be prosecuted where bribes have […]

Small Business Information Security

Small businesses need information security – perhaps even more than a big business because they probably have less resources and are more vulnerable to hackers. NIST has released guidelines for Small Business Information Security –

Data security presentations

My prospects are out, it’s beautiful weather (already got my morning ride in thank you) and time to clean up my desk for the weekend. I need to talk about data security presentations. Most of them are horrible – heavy on technical details or heavy on corporate marketing fluff.  If the presentation is about same […]

Dissonance is bad for business

In music, dissonance is  sound quality which seems “unstable”, and has an aural “need” to “resolve” to a “stable” consonance. Leading up to the Al Quaeda attack on the US in 9/11, the FBI investigated, the CIA analyzed but no one bothered to discuss the impact of Saudis learning to fly but not land airplanes. […]

Data security metrics

Anything can be measured. As  Bertrand Russell wrote – All exact science is based on approximation. If a man tells you he knows a thing exactly, then you can be safe in inferring that you are speaking to an inexact man. This is one of the talks I gave at our weekly Thursday seminar – […]

Data loss prevention from inside out

I love how this Cisco video clip on Blip TV starts with examples of DDOS attacks and then uses shots of incoming content filtering and then dramatizes with a cop not allowing a visitor into the booth –  what is going on here?  Cisco didn’t have budget for an editor who knows the difference between […]

Cultural factors in security

At the DLP Expert 2009 conference in Moscow 2 weeks ago I heard the following insight from Bill Nagel from Forrester: American companies are rule-based. 40% of US companies state that they have implemented some form of DLP technology. European companies are principles-based. In EMEA, 80% of chief security officers do not have plans to […]