Segmenting the IT security market: What you need to know

There are only four segments to the protective IT security space. My detailed list of categories that I use to track the IT security industry has about 85 entries. But I have found it useful to think of IT security in four primary buckets. In my analysis, I focus a great deal on countering attacks so these categories leave out the products that...

Read more

From SOPA to Megaupload (What a week!): Let the legal system decide

The Megaupload takedown and arrests and subsequent wave of retaliatory Distributed Denial of Service (DDoS) attacks that have followed raises a some interesting points in the wake of the apparently temporary shelving of the copyright infringement piracy legislation SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act) earlier in the week....

Read more

EMV – a security standard coming soon (?) to a credit card near you

In my last post , “U.S. clings to insecure magnetic stripe cards — what’s the attraction?” I talked about a security standard for credit and debit cards that is used virtually everywhere in the world except the United States. This standard, called EMV, uses a smart chip embedded in the plastic card or token to securely...

Read more

Money for nothin': Play dumb, join the online fraud network

I've been offered extra work  ̶  as a money mule. A chance to get the household budget in line and our retirement plans back on track after paying the balance on our new roof. Maybe the difference between my daughter going to her first college choice and a state school. There it was, sitting in my Inbox, an opportunity...

Read more

Top-down cyber defense is an upside-down approach

Wired’s Danger Room has reported (http://www.wired.com/dangerroom/2012/01/nsa-cant-defend/) that General Keith Alexander is throwing in the towel. In an address to the FBI-sponsored International Conference on Cyber Security he is quoted: “15,000 enclaves: You can’t see ‘em all. You cannot defend them all,”...

Read more

More Posts