In computer security, we talk about “I&A” – Identification (or Authentication) and Authorization. It’s one of the fundamental problems that makes everything work or not work, accordingly.
In computer security, we talk about “I&A” – Identification (or Authentication) and Authorization. It’s one of the fundamental problems that makes everything work or not work, accordingly.
It took less than 12 hours from the time that the FBI arrested Cesar Sayoc and information about his past inclinations was being dug up and presented. We knew about his arrest record, the threats he’d already made, and people he’d made uncomfortable were chiming in about how they thought he might be a problem someday.
Those hypotheticals about voting machines being insecure? Hand me that tinfoil…
Offensive strategies are good if (and only if) you have an identifiable, small, number of foes that you can dominate.
Bob Moore asks me to comment on an article about propaganda and security/intelligence. [article] This is going to be a mixture of opinion and references to facts; I’ll try to be clear which is which.
Someone who cares about bitcoin more than I do checked the transaction history for the bitcoin wallet provided by the “hacker gang” and it doesn’t look like they have collected any bitcoin with this scam.
Darn this tinfoil chin-strap, it’s hard to keep everything in position. Okay, I think I’ve got it. Ready?
For the last decade, the US military has been hinting that it would like to be able to be more aggressive in cyberspace.
This is a true story of how I got a Message From The Swedish Prime Minister.
“Does anyone here know anything about ‘firewalls’?” asked Steve Walker, the CEO of Trusted Information Systems (TIS). If you read Mechanizing Proof [stderr] stw crops up a couple of times – he was one of the proponents of trustworthy design through formal verification, and TIS produced an evaluated version of UNIX known as Trusted Xenix.
