Being an InfoSec Professional / Cybersecurity

Reflections on certification, part 1

In his essay, “Disabling Professions”, Ivan Illich writes, “Let us first face the fact that the bodies of specialists that now dominate the creation, adjudication and implementation of needs are a new kind of cartel….Professionals assert secret knowledge about human nature, knowledge only they have the right to dispense.” When he wrote the essay, certifications … Continue reading

Cybersecurity / Links

Most e-mailed article

This morning’s most e-mailed article in the on-line version of the New York Times is Nicole Perlroth’s “how to devise passwords that drive hackers away”. It is a somewhat apocalyptic piece that assures you you will get hacked and provides some standard advice (“forget the dictionary”) on constructing and managing strong passwords. http://www.nytimes.com/2012/11/08/technology/personaltech/how-to-devise-passwords-that-drive-hackers-away.html?src=me&ref=general It leaves … Continue reading

Cybersecurity

Originally posted on {Cyber Security}:
An organization needs both.  You need someone who can “weave a yarn”, “tell a tale”, “paint a picture with words”, etc.  But you also need someone who “lets” facts get in the way of those myths. Marketing and sales folks need to be tellers of tales.  And this does not…

Breach announcements

Hack on South Carolina data: criminal; act of international cyber terrorism: huh?

[note: the links are no longer active, apologies] In this example, the press takes advantage of recent comments about a “cyber Pearl Harbor” and implies that what looks like a case of identity theft for the purposes of tax and credit card fraud is an international cyber attack on the U.S. by our enemies. The press release … Continue reading

Being an InfoSec Professional / Cybersecurity

SWAT Teams, Power Rangers and Nerds with an edge

As you work in the Information Security field, you realize you can classify your peers into three groups. I guess the title gives away what they are. But it is true. You have the mil-intel-nation-state-attack-vector types. They think of Information Security as an extension of warfare in virtual space. They are often very strong on … Continue reading