Trending Sources

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

From time immemorial, our identity systems have been based on face-to-face interactions and on physical documents and processes. What is identity?

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The attacker has the advantage.

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

Entrepreneurship and flexible security. We are transitioning to a digital economy whose vast implications are not well understood.


Dave Snowden

The post Security? I had three presentations today and my voice held up, just. Now I know that is not a universal, but it is a common pattern.

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. “1 tip for managing creative people: don’t.” ” @flowchainsensei.

Your Twitter security is an egg, not an onion

Martijn Linssen

why not both Home About Contact Thursday, 13 January 2011 Your Twitter security is an egg, not an onion Hard to come up with a more fuzzy title really.

Deaf police to monitor security cameras in Mexico

Mind Hacks

This potentially makes them perfect for the job and likely better than their hearing colleagues. Link to brief new article on the project.

Noam Chomsky, security, and equivocal information

David Weinberger

That’s why you should be extremely cautious when you hear an appeal to security. I don’t doubt that the US security folks believe it, but it is without meaning. security folks say they are spying on us for our own security, are they saying literally nothing? Thus, the security claim isn’t made on its own.

Help: why don’t images load in https?

Doc Searls

Berkman Blogging Harvard Internet problems publishing securitySame goes for the ProjectVRM blog as well. Or so I gather. WordPress removes them.

We know we’ve traded away privacy. But for exactly what security?

Doc Searls

It has been said that “security” is not found in apprehending a guilty party but in preventing the harm from occurring. While this notion can surely be overextended, it can also be understood to justify a certain degree of intelligence gathering in the service of safety and security.

News 31

Outside Security

Stephen Downes: Half an Hour

This , of course, is the inevitability that some terrorist somewhere will notice that the best targets today are in those heaving seas of tired, parched and irritable seas of humanity crowded immediately outside security. But we are supposed to trust these people who are managing our security for us. Of our own security.

Adventure & security

Dave Snowden

Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. So new wine for new wineskins, it's a simple test and while it has a delight of adventure it is far from secure.

Security vs. Utility

Doc Searls

icon icons location bar Mozilla security tool bar What’s the name for that?) Now, with version 3.5.3 (and Mozilla’s? Of whom?

Security Alert Related to Snowden?

Nine Shift

Is this weekend''s security aler t related to the Snowden case? Not one given to conspriracy, but we just have had the head of the NSA lie to Congress and the American public, with no penalty. The attorney general had to declare publicly he would not be tortured. When has the US had to promise not to torture an American citizen?

[shorenstein][liveblog] Juliette Kayyem on communicating about security

David Weinberger

Juliette Kayyem , a former Boston Globe columnist, a commentator, Homeland Security advisor to Gov. Deval Patrick, and a former candidate for governor of Massachusetts, is giving a Shorenstein Center talk about how to talk with the public about security issues. She learned that last lesson from her security experience. Response.

If credit card companies cared about security…

David Weinberger

When there’s a security issue, they wouldn’t robocall people and ask them to provide personal information. They would robocall people and ask them to call the number on the back of their cards. They would put people’s photographs on their credit cards.

Smart and secure grids and militaries

David Weinberger

Andy is an MIT and DC energy tech guy (and, it turns out, a neighbor) who writes two blogs: The Smart Grid Security Blog and the DoD Energy Blog. Tags: ecology power military security experts The piece I wrote about Robin Chase prompted Andrew Bochman to send me an email. So many things in the world to care about!

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Security is not convenient.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. In the U.S. Patriot Act - impact on B.C. not abroad.

Google: Make security the default (Now with Iranian tweets)

David Weinberger

Tags: google security iran twitter

Shifting IT delivery to tablets: The strategic issues

Dion Hinchcliffe

What will it take to successfully shift IT delivery to these devices given the security worries, legacy IT landscape, BYOD, and other issues Tablets are likely to become the primary computing experience for workers over the next few years.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. Communication Security Establishment (CSE) common criteria. Trojans.

Citicard does its best to train us in horrible security practices

David Weinberger

Citibank continues to train its customers to use terrible security processes. This morning I got a call from a robot that claimed to be from Citibank. When I refused to type in my zip code, and then waited for two minutes of repeated requests to do so, it transferred me to a human who wanted me to give him my name and password.

Disruptive technologies 2015-2016

Jane Hart

Topics include cyber security, mobile payments, drones, bitcoin, social media, digital, omnichannel, attribution, cx, music, movies, Hollywood 25 Disruptive Technology Trends 2015 – 2016 from Brian Solis. Social learning

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. You are not secure. Summary of a talk by Parry Aftab at the IFIPTMA Conference in Moncton. It is important that you know why I am so trustworthy.

Firewalls and Security in Software as a Service

Tony Karrer

The other big hurdle is the question of security. Generally, I think you will find that hosts provide fairly reasonable control, but you will want to check into their security approach. The security issue not new. The advice from an article in CFO Magazine: Data security. Look at security. That's its job.

Latest: Equity crowdfunding coming shortly? Congress offers bipartisan support

Ross Dawson

Amends the Securities Exchange Act of 1934 to exclude persons holding crowdfunded securities under this Act from application of “held of record” requirements with respect to mandatory registration of securities. Authorizes an issuer to rely upon certifications provided by investors.

Report: The Future of Digital Australia in 2025 and what Australians think

Ross Dawson

All the assets are on the Intel Security 2025 site. TECH SECURITY INFOGRAPHIC vimeo HD 1080.mp4 from McAfee APAC on Vimeo.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Why wasn’t stronger security designed into the original Internet protocols? The book is organized into three main sections. If we will it.”.

Inside Britain's highest security psychiatric hospital

Mind Hacks

The Independent has an article giving a rare look inside Broadmoor Hospital , one of only four high security psychiatric hospital in the UK, which houses some of the most severely dangerous offenders with mental illness. The only other recent example I can think of was a 2004 edition of BBC All in the Mind that you can still listen to online.

Airport psych security: snake oil on a plane?

Mind Hacks

Nature has an extensive article on the 'deception detection training' that's been widely rolled out for airport security staff and anti-terrorism police despite that fact that is has barely been publicly tested. Link to Nature 'Airport security: Intent to deceive

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Workforce development.

Data 68

Tear the walls down: Jericho and the future of enterprise tech

Ross Dawson

As Jericho Forum puts it: The huge explosion in business collaboration and commerce on the Web means that today’s traditional approaches to securing a network boundary are at best flawed, and at worst ineffective. The forum believes responding to the challenges of de-perimeterization must be central to all IT security strategies.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

These include social security ID, passport number, driver’s license number, e-mail address, telephone numbers, and login IDs and passwords.

The Growing Importance of Storytelling in the Business World

Irving Wladawsky-Berger

Let me know discuss the use of blockchain technologies for enhancing the overall security and efficiency of our transactional systems.

What does the Internet of Everything mean to you?

Harold Jarche

“Cisco believes that many organizations are already experiencing the Internet of Things (IoT)—the networked connection of physical objects.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor. My folders.

One More Industry Where Employment is Dropping as Output Rises

Andy McAfee

” This employment decline has taken place despite the fact that US financial industry profits are at an all-time high. The Wall St. Do you

What will universities monetize in the future?

George Siemens

The badges and competency-based learning movement may challenge assessment, but at this point it remains reasonably secure.

a workable future

Harold Jarche

full report PDF ). Combine the best of investor-owned and commons-based platform models. Solve for both transparency and privacy.