Archive | Security Matters RSS feed for this section

Back from the dead: the original virus writers.


A great many computer security events occur around the world all the time, but the RSA Conference is one of the most important of all of them. What exactly it’s all about here I’ll not go into. All in all – great conf/exhib. But it was reports that originated thousands of miles from sunny San Fran that got me all excited most of all (not to mention concerned). My mind was totally blown by news of the appearance of a new Trojan – MiniDuke. I was in shock! Why? Read on…

Continue reading

MDM: Mobile Discipline Mastery.


BYOD: four letters which in several years have turned upside down the notions of the organization of labor, motivation, corporate ethics, productivity, communications, leisure, and a lot more besides… and not forgetting of course one more notion – that of security. For large organizations, the number of connected personal devices can reach the tens of thousands. So how is it possible to bring some mobile discipline mastery to them all – to conduct a symphony that’s pleasant to the ear of the administrators given the awful initial cacophony made by all those different, uncontrollable devices? How do you protect, monitor, and manage this pasticcio? Enter MDM – Mobile Device Management …

Continue reading

Obama: patents patently barmy.


A serious issue I’ve been critically writing and talking about for several years has finally made its way up through the echelons of power to find itself being officially recognized – and condemned – by no less than the President of the USA! Indeed, the day before President’s Day Barak Obama issued a strong rebuke against patent trolls! Ye gods. At last some sense from the top! …

Continue reading

A Move in the Right Direction.


On Tuesday, President Obama issued a long awaited Executive Order on cyber security intended to expand and deliver more robust information sharing between government and the private sector. I believe this executive order is a move in the right direction as it seeks to increase digital defenses of critical infrastructure, and tries to facilitate the exchange of threat information between the government and private sector …

Continue reading

All Mouth, No Trouser.


“All animals are equal, but some are more equal than others.” Thus spake Napoleon, the head-hog in Orwell’s dystopian classic. The genius of this phrase lies in its universality – a small addition turns the truth inside out. Alas, this witty paradox [sic.] is met not only in farmer-revolutionary sagas, but also in such (seemingly […]

Continue reading