The Elephant In The Connected Room

Computer security is a new(ish) field, so we get to make up names for things. That’s an advantage and a disadvantage – it means that marketing people can come up with new-sounding names for old stuff, and sometimes customers get all excited and buy it because it sounds so new!

[Read more…]

More Competence Porn

Since 2004 or so, I’ve done a column over at SearchSecurity [ss] which started out as me doing a point/counterpoint with Bruce Schneier and ended with me interviewing interesting people from all over the field. I’m stopping doing the column, finally, this fall, due to “internet security fatigue” triggered by decades of saying the same thing.

[Read more…]

The Retroscope At Play

By now, the establishment ought to be painfully aware that the FBI/NSA retro-scope is aimed at them, as well. Sometime in the next couple of years I expect a legislative backlash, especially if it keeps being used to take down friends of the high and mighty.

[Read more…]

Wow, That Sure is … inCONVENIENT…

In the late 1990s, the US Government was setting up a case to argue that hacking equated to terrorism. Because, while it was mostly being used for illicit state-craft, it could potentially be used by terrorists. In 1997, at a keynote for Black Hat Briefings, I warned the hacker community what was coming but – at that time – there was a great deal of “community outreach” being done by NSA – they were hiring hackers (whose work we now see leaking on a regular basis) and it was all very hip and friendly.

[Read more…]

Some Good Signs

Meanwhile, there are occasionally signs that the effort is paying off. Security hasn’t been too bad but it’s had its #MeToo moments and the conferences used to have “booth babes” and a lot of “locker room talk.”

[Read more…]