Archive | August, 2016


Security Vulnerability Research = Stock Manipulation?

Last week a group of “security researchers” teamed up with an investment firm in order to make money shorting the stock just before releasing a report on alleged vulnerabilities.  Let’s look at this novel business model.  Disclaimer:  I am not an attorney. Anyone doing this needs to be very sure of their conclusions before trying [...]
Continue Reading

Do you know where your endpoints are?

The Register recently reported that a quarter of banks data breaches are due to lost laptops and phones. Let’s look at that for a minute, because it shows that there’s some basic blocking and tackling that needs to be put in place.    I suspect that the vast majority of that loss isn’t due to active [...]
Continue Reading