Not all of my content can be found on blogs, podcasts and other linked sites. Here are selected appearances from around the web.

Security perspectives, posts and articles for Dell

  • Drone Hacking and Information Security referencing Die Hard 2 and then-recent news that Iran claimed to have downed a US drone safely by redirecting the GPS to land in their territory.
  • Home Improvement and Information Security comparing home improvement shows to improving organizations’ security programs, and the folly of trying to do what everyone else does (“best practice”).
  • Technology Products and Implementation: A Short Historical Perspective is a tongue-in-cheek treatment of the way too many vendors and buyers work in our industry, using the technology of fire as an analog.
  • SCADA Vulns and Exploits Published gives technical information on the then-recently released information about a wealth of issues found in equipment that control industrial controls systems that control much of the power generation, transmission and distribution, as well as other critical infrastructure.
  • PCI Guidance on Virtualization and Cloud walks through then-recent clarification and guidance the Payment Card Industry Council gave for complying with the Data Security Standard when using virtualization technology and cloud service providers.
  • Are Your Browser CAs Considered Critical Vendors shines the light on the often overlooked trust relationships that could – and have – been exploited to gain access to information, such as by nation-states and government agencies.
  • Securely Deleting Data gives information and tools to help organizations and individuals ensure their information is erased when disposing of hard drives, USB sticks, and other data storage media.
  • Spam and the Changing Business Model of Cyber Crime uses a Freakonomics article to dissect new business models used by criminals, using more targeted email attacks as the market of victims and consumers change.
  • CIA Confirms Cyber Attack Caused Multi-City Power Outage references Die Hard 4: Live Free and Die Hard as well as the original Die Hard movie (can you tell I’m a fan of John McClaine?) and discusses many different incidents where malicious attackers supposedly have disrupted power and other critical services.
  • How to Prevent HIPAA Violations is a set of tips and advice, rather than the canonical guide.

Security articles on Infosec Island

Videos and presentations

Vulnerability disclosures