Tag Archives: Bruce Schneier

Bruce Schneier Useless Fun Facts

If you have any idea of who Bruce Schneier is, you have to check out http://www.schneierfacts.com/. It is useless funny facts about Bruce a la Chuck Norris. Try not to LOL.

Continue reading

2 Comments

Filed under Humor/Irony, Security

A Few Good Posts

Whether you’re new to this blog or not, you might have missed a few good posts. Here’s some links and short descriptions.

Schneier’s Security Trade-offs – Security expert Bruce Schneier’s 5 questions for assessing the security process of anything.

Continue reading

Advertisement

Leave a comment

Filed under Humor/Irony, Security

Teach Yourself Security

What does it take to get started in information security? Can you teach yourself security?

This field requires you to understand how PCs, mobile devices, applications, servers, protocols, and networks operate. It helps to have a lot of curiosity and a good sense of where trouble lurks. And don’t forget Unix/Linux (more on that later).

I started as a PC support guy, became a server administrator, managed a network, and then became a security analyst. For me, it was a natural progression, but that’s the “old school” way of doing it. Security training was scarce, and there were few to no institutions offering training specific to that area. Also, the internet was still growing, and there were few security websites or blogs to learn from.

Continue reading

1 Comment

Filed under How to..., Security

Share credit card purchases on the web?

On Facebook, you can share your pictures; on LinkedIn, you can share your resume; on Twitter, you can share what you had for second breakfast.

On Blippy, you can share your credit card purchases!

Continue reading

Leave a comment

Filed under Security

My Favorite Windows Software

In Top 100 Network Security Tools and Easy Windows Scanner, I described a few Windows tools that every auditor or security analyst should know or know about. In this post, I highlight some of my other favorite Windows tools (both security and general utility software). ALL OF THEM ARE FREE.

12/26/14 Update: These are STILL my favorite programs. The only one I don’t use anymore is CutePDF Writer,  which I replaced with the FREE Sumntra PDF  Foxit Reader (I no longer recommend FOXit). But if you only want a PDF printer, CutePDF is still a great solution.

I also added 2 new tools: PSPad and File Splitter (see my links at the bottom).

Continue reading

2 Comments

Filed under Audit, Free, How to..., Security, Technology

IT Security Pioneers

SC Magazine had a good article back in November (I am a bit behind in my reading and my blogging) about industry pioneers in IT security. Listed below are quotes by a select few of the people the mag profiled. If you find their quotes interesting, or you are not familiar with them, I suggest you check out the article and perhaps do some extra reading about some of them.

I thought cryptography was a technique that did not require your trusting other people…” – Whitfield Diffie

Continue reading

Leave a comment

Filed under Security

Schneier’s Security Trade-offs

Bruce Schneier has 5 questions for assessing security and the trade-offs that are made during the assessment process.

  1. What assets are you trying to protect?
  2. What are the risks to these assets?
  3. How well does the security solution mitigate those risks?
  4. What other risks does the security solution cause?
  5. What trade-offs does the security solution require?

Continue reading

Leave a comment

Filed under Audit, Security

Data is the Pollution of the Information Age

Bruce Schneier summarizes his earlier work on privacy in Privacy in the Age of Persistence, where he says, “Welcome to the future, where everything about you is saved.”

Continue reading

Leave a comment

Filed under Security

Clean Your Purse & iPod

When’s the last time you cleaned out your wallet or purse or secured sensitive data on your hard drives?  Many of us intend to practice good security and protect ourselves at home, and many others don’t even give it a grey cell.

It’s time again to:

  • Change all your critical passwords for online banking, investment sites, email, password safe, etc. (see note #1 below).

Continue reading

Leave a comment

Filed under Security, Security Scope, Written by Skyyler