Obama cyberspace policy review

Last week, I got an email from the Internet Security Alliance (a trade association of companies like Raytheon and Northrup-Grumman that lobbies the government on cyber-security issues) with  Melissa Hathaway’s speech to the RSA Security conference. Besides all the touch-feely stuff –  I didn’t understand anything she is saying (and I’m a native English speaker..). […]

Joshua Redman vs James Carter Live At Carnegie Hall

The ultimate battle of the tenor saxophone masters – Joshua Redman and James Carter live at Carnegie Hall unbelievable exhibition of technique, improvisation and sound.  I would give Redman slightly higher marks on sound and Carter slighly higher marks for his incredible use of altissima register. But besides that – words are not enough.

Postgresql 8.4 or MySQL

MySQL now belongs to Oracle – Oracle’s track record on keeping acquisitions alive is mixed. If you want a real database that is extremely Oracle compliant (PLpgSQL is very close to PL/SQL) look no further than then harder (more secure), better, faster Postgresql 8.4 the world’s most advanced Open Source database.   Using the new […]

Data security case study

A lot of companies do V/A (vulnerability assessments) with scanners like Beyond Security or Nessus.  We took a hybrid approach for an internal security assessment using a Fidelis Security Systems network DLP appliance for detecting data loss vulnerabilities and structured human interviews to identify assets and analyze business threats such as competitors who might steal […]

Business process mapping and risk management

Many risk management consultants tell organizations that they must perform a detailed business process mapping and build data flow diagrams of data and users who process data in order to achieve compliance and reduce the operational risk of information security. This is a very bad idea. Business process mapping is an expensive task to execute […]

Social networks, not branded networks

Apparently people in a social network like Facebook don’t mind the ads but they  would not join a branded group according to this article Social network users reluctant to join branded groups Less than one third of social network users would be willing to join a brand’s group even with the offer of exclusive or […]

Data loss trends

There is a slight uptick in demand for our services, which I’ve put down to more aggressive marketing on our part. However – industry analysts have some interesting takes on which companies invest in data loss prevention.  Not surprisingly – regulated industries (telecom, finance) buy DLP, unregulated (retail/manufacturing) and small-medium sized business don’t buy DLP. […]

Personal marketing skills

I frequently get people asking me to help them find jobs.  Sometimes, the answer is that it’s time to start out on your own or start a new career in something else besides software or security or technology. But sometimes, the answer is improving your personal marketing skills in order to improve your chances of […]

Microsoft in close cooperation with new Israeli government

The Israeli online economic daily Calcalist published an item which has drawn the wrath of the Israeli Free Open Source community. However – reading the item carefully – I would say that all of the objectives are fair enough and worthy enough for the largest software vendor in the world to be involved.   I would […]