General Musing

blaze your trail

Posts Tagged ‘data

Kings of Code Conference #kingsofcode

with 2 comments

This week I went to the Kings of Code Conference, to “explore and discuss the latest trends, developments and best practices in web and mobile development technologies.” It included a hackbattle, lots of presentations and free beer.

HackBattle

Read the rest of this entry »

About these ads

Written by Daniël W. Crompton (webhat)

September 23, 2011 at 1:35 pm

6 Months of Security Links #2011

leave a comment »

I’m a regular curator of daily links, and like to give overviews of my collection of curated links and posts. This is partly as there are some good sources and articles in here and as I am working on a research project which I started based on a number of books I read.

I’m sure you’ll find something interesting in the items below – there are some gems in the list – and I dare to hazard the guess you might learn something you wanted to know. :)

Read the rest of this entry »

Written by Daniël W. Crompton (webhat)

July 15, 2011 at 4:10 pm

Posted in tagging

Tagged with , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

This year’s book reviews #2010

leave a comment »

Programming Hands

As always I read far more in 2010 than I blogged about, and most of the books I did blog about were treasures. I hope I inspired you to read at least one of them. And you have certainly noticed that I have added them all to the bookstore to make it easier for you to find out more about them.

I’ve had this title in my head for about a week now, the title is natur…

I’m reading Bruce Sterling‘s Islands in the Net – Amazon de…

As followers of mine will know I love xkcd, and he has some gems such as this…

I read Amsterdam: The Brief Life of a City by Geert Mak in English rather tha…

I’ve seen the film more than a dozen times, but I had yet to read Star …

Brian Jacques‘s book Outcast of Redwallfollows Veil the ferret who is r…

The Odessa File, by Frederick Forsyth, is another of the books I am keeping s…

Brian Jacques‘s book Martin the Warrior is another book from the Redwal…

I found The Moon’s a Balloon, by David Niven, in a box of old books. I …

Mossflower by Brian Jacques is probably my favourite of the Redwall series, t…

Timothy Leary once told us to “Turn on, tune in, drop out“, and a…

For some reason I had the book Rosalind Franklin: The Dark Lady of DNA, by Br…

After having seen many films and read many books I expected that Hitler: The …

One of my first real American comics was Thor, I really liked it. Sadly it re…

I like Ontologies, Taxonomies and Folksonomies. I’m currently reading W…

I read Mario Puzo famed book The Godfather after having seen the movie a numb…

As I previously said I bought Anathem at the same time I bought Cryptonomicon…

I borrowed a number of books from an aunt of mine, who reviewed these books f…

I was standing in a secondhand book store with my father, and we wandered rou…

As an early Christmas gift my father gave me vouchers he didn’t want to…

The Snake is the first book I have read by John Godey, it was recommended to …

In the company I work for they are introducing the Agile FrameWork, in the fo…

Image source: Honou

Just Finished Reading: “Islands in the Net” #wikileaks #books #datahaven

leave a comment »

I’m reading Bruce Sterling‘s Islands in the Net – Amazon describes it as

Slightly dated science fiction about the near future can be fun, especially when it evokes a strange, chaotic, and dangerous world that’s uncomfortably close to our present one.

And the irony is that Amazon is involved in a situation with chilling parallels, with Wikileaks and lesser known Amazon customers being called data pirates, similar to the way they are described in the book.

Of course there are already existing data havens like , and there is the new creation of a data haven for journalists and free speech in Iceland.[1] Other data havens are almost certainly in creation, as described in another work of fiction . I believe that these are most probably currently being hosted in encrypted clusters by Google and Amazon, with or without their knowledge, and almost certainly these exist in smaller countries.

The next parallel is the violations of copyrighted materials by these data pirates, there is serious money in piracy just look at China and the streets of New York or any other major city. It’s already possible to become a paid member of a piracy group online – comparable to a piracy Netflix – where in exchange for your payment you get a monthly allotted number of points to use to download films and television series collecting points by sharing a fixed ratio more than you download, and where everything is tracked by the torrent tracker.

There are other parallels, but for that I advise you read the book…

  1. Wikileaks and Iceland MPs propose ‘journalism haven’

Written by Daniël W. Crompton (webhat)

December 12, 2010 at 3:18 pm

Posted in books, review

Tagged with , , , , ,

ACM.ORG (Association for Computing Machinery) data leak #security

with 3 comments

UPDATE:After raising pressure a little bit (also by writing to [the Full-Disclosure] list) ACM has finally reacted and asked where the problem is.

According to a post on Full-Disclosure there is a dataleak on the website of ACM. The “hacker” stated that 4 days ago he notified “ACM’s CEO John White of the severe data leak on acm.org – but the leak has not been fixed.

Read the rest of this entry »

Written by Daniël W. Crompton (webhat)

February 22, 2010 at 8:42 pm

Posted in security

Tagged with , , ,

Tightening your Security Budget #security

leave a comment »

I was reading 6 Tips For Doing More Security With Less and was happily surprised by the following points:

1. Get out of the deployment business.
3. Get more out of your existing security tools and systems

1. Get out of the deployment business.
IT security should definitely be involved in selecting data protection tools, but shouldn’t be dealing with provisioning tools that require heavy customization, Forrester’s Jaquith says. That can drain already-limited resources.

Many companies want provisioning tools with which they can specifically add users and specific edit fields, they want a helpdesk to perform this task so they can have cheap labour without compromising security. This is a short term thinking by Forrester, in my opinion.

3. Get more out of your existing security tools and systems
[…]
Consider reorienting the more labor-intensive tools, such as those for data leakage prevention (DLP), he says. Forrester recommends using DLP products mainly for monitoring activity rather than for blocking the leakage of data. And enlist the help of your business units to get the big picture on where data is flowing in the organization. “If you are looking at DLP to stop a data leak, you’re probably a little too late. You need to understand how users are using the information they have, what they are downloading, [etc.],” he says.

Absolutely, if you are using DLP to prevent data leakage you are doing it wrong. Implementing controls to monitor data leakage and informing your employees is far more effective and less intensive on the budget. The recently passed Nokia Law to allow email snooping may look evil on the surface, but this is also part of DLP. Personally I am against the tactics used by Nokia, but they have a valid reason to monitor their network traffic for data leakage, corporate espionage.

Technorati Technorati Tags: , , , , , , ,

Written by Daniël W. Crompton (webhat)

March 5, 2009 at 7:33 pm

Follow

Get every new post delivered to your Inbox.

Join 3,126 other followers

%d bloggers like this: