This morning’s most e-mailed article in the on-line version of the New York Times is Nicole Perlroth’s “how to devise passwords that drive hackers away”. It is a somewhat apocalyptic piece that assures you you will get hacked and provides some standard advice (“forget the dictionary”) on constructing and managing strong passwords. http://www.nytimes.com/2012/11/08/technology/personaltech/how-to-devise-passwords-that-drive-hackers-away.html?src=me&ref=general It leaves … Continue reading
Category Archives: Links
Smart stuff other people write.
US Privacy Law chaos
Dr. Solove illulstrates the core of the problem. http://www.linkedin.com/today/post/article/20121024165918-2259773-the-chaos-of-us-privacy-law Continue reading
Encryption & efficiency
A link about encryption from Bruce Schneier’s latest Cryptogram. A useful scheme with current business application. What is noteworthy is that the article mentions that the solution is not yet efficient for business use. But no metrics are provided. It is common that security is resisted with phrases like “inefficient”, “negative user impact” and ” … Continue reading
Identity Management in Health Care
Is all risk worth insuring?
Mark Rasch reminds us of the answer: risk is worth insuring when you and the insurer agree on what is being covered. http://storefrontbacktalk.com/securityfraud/the-legal-perils-of-cyber-insurance-for-retailers/ Continue reading
Visibility v. Privacy
Cousin Jesse quoted in this recent article about Facebook settings. Speaks for itself: http://mbcalyn.com/2012/06/27/on-facebook-the-semantics-of-visibility-vs-privacy-nytimes-com/ Continue reading