Why One Hack Is Different From Another For Consumers

I often field questions about what certain news stories mean in general and to the person asking me.  These questions tend to include “what should I do” followed by “is that what you’re doing?” First – As the About page states, these are my views and not indicative of any employer or any other associate… Continue reading Why One Hack Is Different From Another For Consumers

Equifax Hack – Your First Steps

Several people have asked what steps to take to protect themselves, particularly their electronic identity, in the wake of the Equifax hack.  Here are some suggested steps that, while not guaranteed to provide protection, at least give you an idea of things I’m doing with some links to make it easier.   Steps Get a… Continue reading Equifax Hack – Your First Steps

Information Security Costs May Be Delayed But At What Price

[S]oftware solutions delivered to market cost money. Secure software solutions or products and services with critical dependency on secure software solutions cost more money.  Hospira is finding this out with its older medical pumps in the Symbiq line.     Fiat Chrysler is finding out what fixing a problem in production costs. Their security oversight?… Continue reading Information Security Costs May Be Delayed But At What Price

Delivery IS Business

Business [W]hether your business’ core competencies involve products, services or legally binding promises, delivery is a measuring stick that’s used to evaluate you. Do you deliver what customers want ahead of the industry?  Do you deliver it better or cheaper.  Do you deliver a different experience; are you a boutique for your industry? Regardless of… Continue reading Delivery IS Business

Brother Can You Spare a Protocol?

If you haven’t yet heard of the SSLv3 protocol exploit then where have you been and how can you sleep at night.  Surely someone ran past you yesterday (Tuesday 10/14/14) with his hair on fire, screaming about graceful degradation of protocols.     You can read about the POODLE exploit process any number of places… Continue reading Brother Can You Spare a Protocol?