


Is your security architecture Fractal or Fractured?
Fractals are a really cool mathematical concept that reflect an almost recursive like pattern, that reoccurs at smaller and smaller scales. The classic Mandelbrot image is a perfect example of this – the larger forms come first, then as you scale down, more details emerge, all in perfect alignment and part of a cohesive pattern. […]

Friday Photo – Critters in Alaskan Waters

Iconic Yellowstone

Last Four is Foolish
I keep running across companies that still, in 2018, are using the last four digits of SSN or mother’s maiden name as an authenticator. We have 170+ million reasons why that’s a bad idea, and yet it persists. That’s beyond inertia, past laziness, and nearly into negligence territory. It’s time to end the practice of […]

Friday Photo – Hound in the Snow

I’m shocked – shocked that Facebook sells data (not)
There’s been a lot of commentary about Facebook selling data to third party companies over the past week or so. The distaste is understandable, but no one should be surprised. Just who do folks think Facebooks customers are?

Dreaming of a white March

Chicken little has left the building – selling security without fear
Fear, Uncertainty and Doubt. I still see security professionals – especially vendors – trying to use that tired old technique. Even with lay audiences it’s lost effectiveness, and it has absolutely no place in the CISO’s office, inbox, or voice mail. Fear based selling is a cop-out, and a sure way to not get a […]

iOS 11 crack – should you be worried?
There are a number of media reports out that Israeli firm Cellebrite is now able to unlock iPhones even running the latest version of iOS, including the iPhone X. Should you be worried? Let’s look at some potential threats.