Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Technological advancement is outpacing security and will continue to do so unless we change how we approach and implement cybersecurity strategies and practices.

online privacy and security

Harold Jarche

As the internet becomes an essential part of lives — enabling us to access government services, connect with friends, and earn a living — there are frustratingly few ways to maintain privacy or security online.

Trending Sources

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are no longer adequate. From time immemorial, our identity systems have been based on face-to-face interactions and on physical documents and processes.

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

The article makes a strong case for flexicurity - shorthand for flexible security, - a social model from the Nordic countries which aims to achieve both flexibility in labor markets and security for workers. Entrepreneurship and flexible security.

Security?

Dave Snowden

The post Security? I had three presentations today and my voice held up, just. I’ve had a bad cold for weeks and jumping time zones is not the best way to shake that off. But I fell back on a trusted recipe of lemsip, whisky, throat sweets and a degree of self-delusion as to my condition.

The problem for people isn’t advertising, and the problem for advertising isn’t blocking. The problem for both is tracking.

Doc Searls

adtech advertising Business Identity Internet Journalism Law marketing privacy problems publishing security

cooperation, measurement, security and more

Harold Jarche

Every fortnight I curate some of the observations and insights that were shared on social media. I call these Friday’s Finds. hrheingold : “Don’t refuse to believe; refuse to start out believing.” ” #crapdetection.

Deaf police to monitor security cameras in Mexico

Mind Hacks

He noted these police officers have a very strong deaf and visual sense and can better detect what is happening in different places where the cameras are located; they can often remotely read the conversations of people, to the benefit of this security system that operates 24 hours a day.

Noam Chomsky, security, and equivocal information

David Weinberger

That’s why you should be extremely cautious when you hear an appeal to security. I don’t doubt that the US security folks believe it, but it is without meaning. security folks say they are spying on us for our own security, are they saying literally nothing? Chomsky’s generalization that governments always justify surveillance in the name of security. These are all forms of surveillance, but in none of these cases is security given as the justification.

We know we’ve traded away privacy. But for exactly what security?

Doc Searls

It has been said that “security” is not found in apprehending a guilty party but in preventing the harm from occurring. While this notion can surely be overextended, it can also be understood to justify a certain degree of intelligence gathering in the service of safety and security.

News 31

Help: why don’t images load in https?

Doc Searls

Berkman Blogging Harvard Internet problems publishing securityFor some reason, many or most of the images in this blog don’t load in some browsers. Same goes for the ProjectVRM blog as well. This is new, and I don’t know exactly why it’s happening.

Outside Security

Stephen Downes: Half an Hour

This , of course, is the inevitability that some terrorist somewhere will notice that the best targets today are in those heaving seas of tired, parched and irritable seas of humanity crowded immediately outside security. But we are supposed to trust these people who are managing our security for us. It is hard, very hard, to think of our national security forces as the enemy. Of our own security. I am not a specialist in security and defense and terrorism.

Adventure & security

Dave Snowden

Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. So new wine for new wineskins, it's a simple test and while it has a delight of adventure it is far from secure. It's Thursday so it must be Bangkok more or less summarises this week which is a series of 1/2 night hotel stays.

Security vs. Utility

Doc Searls

icon icons location bar Mozilla security tool bar Starting a few upgrades back, Firefox started showing this… … when you clicked on that little icon at the left end of the location bar. What’s the name for that?) Now, with version 3.5.3 (and

Security Alert Related to Snowden?

Nine Shift

Is this weekend''s security aler t related to the Snowden case? Not one given to conspriracy, but we just have had the head of the NSA lie to Congress and the American public, with no penalty. Then we have Snowden pointing out that the head of the NSA lied to Congress and the American public, and he is considered a traitor worthy of life imprisonment. The attorney general had to declare publicly he would not be tortured. When has the US had to promise not to torture an American citizen?

[shorenstein][liveblog] Juliette Kayyem on communicating about security

David Weinberger

Juliette Kayyem , a former Boston Globe columnist, a commentator, Homeland Security advisor to Gov. Deval Patrick, and a former candidate for governor of Massachusetts, is giving a Shorenstein Center talk about how to talk with the public about security issues. Juliette oversaw the local Homeland Security response to the Marathon Bombing and had participated in the security planning. She learned that last lesson from her security experience.

If credit card companies cared about security…

David Weinberger

When there’s a security issue, they wouldn’t robocall people and ask them to provide personal information. They would robocall people and ask them to call the number on the back of their cards. They would put people’s photographs on their credit cards. Citi used to offer that as a free option, but apparently has discontinued the practice

Smart and secure grids and militaries

David Weinberger

Andy is an MIT and DC energy tech guy (and, it turns out, a neighbor) who writes two blogs: The Smart Grid Security Blog and the DoD Energy Blog. Tags: ecology power military security experts The Wired.com piece I wrote about Robin Chase prompted Andrew Bochman to send me an email.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto. Security is not convenient.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

Google: Make security the default (Now with Iranian tweets)

David Weinberger

Tags: google security iran twitter

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Citicard does its best to train us in horrible security practices

David Weinberger

Citibank continues to train its customers to use terrible security processes. This morning I got a call from a robot that claimed to be from Citibank. When I refused to type in my zip code, and then waited for two minutes of repeated requests to do so, it transferred me to a human who wanted me to give him my name and password. Thus does Citibank train its users to divulge personal information to anyone with an automated phone dialer.

Disruptive technologies 2015-2016

Jane Hart

Topics include cyber security, mobile payments, drones, bitcoin, social media, digital, omnichannel, attribution, cx, music, movies, Hollywood 25 Disruptive Technology Trends 2015 – 2016 from Brian Solis. In the embedded presentation below, Brian Solis explores some of the biggest technology trends and possible twists on the horizon for 2015 and 2016.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. You are not secure. Summary of a talk by Parry Aftab at the IFIPTMA Conference in Moncton. It is important that you know why I am so trustworthy. I am the most trustworthy person on the internet. A recent widow in Nigeria wrote to me and told me so. I get all these emails. So I must be trustworthy.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages. Look at security.

Latest: Equity crowdfunding coming shortly? Congress offers bipartisan support

Ross Dawson

Amends the Securities Exchange Act of 1934 to exclude persons holding crowdfunded securities under this Act from application of “held of record” requirements with respect to mandatory registration of securities. Amends the Securities Act of 1933 to exempt such crowdfunded securities from state regulation of securities offerings.

Shifting IT delivery to tablets: The strategic issues

Dion Hinchcliffe

What will it take to successfully shift IT delivery to these devices given the security worries, legacy IT landscape, BYOD, and other issues Tablets are likely to become the primary computing experience for workers over the next few years.

Report: The Future of Digital Australia in 2025 and what Australians think

Ross Dawson

I have been recently working with McAfee, now part of Intel Security, to write a report on Safeguarding the Future of Digital Australia in 2025 , being launched this morning in Parliament House in Canberra as part of the Federal Government’s Stay Smart Online Week.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Foremost among these limitations are privacy, security and inclusion. “Doing business on the Internet requires a leap of faith” because the infrastructure lacks the necessary security. Why wasn’t stronger security designed into the original Internet protocols?

Inside Britain's highest security psychiatric hospital

Mind Hacks

The Independent has an article giving a rare look inside Broadmoor Hospital , one of only four high security psychiatric hospital in the UK, which houses some of the most severely dangerous offenders with mental illness. Broadmoor is the oldest and most well-known high secure hospital in Britain, having housed a string of high profile murders and other violent offenders since Victorian times to the present day.

Is Blockchain the Major Next Step in the Evolution of the Internet

Irving Wladawsky-Berger

To take its major next step, the Internet must overcome three such serious limitations: security, complexity, and trust. Security . Consequently, there’s no one overall owner responsible for security , let alone identity management, over the Internet.

Airport psych security: snake oil on a plane?

Mind Hacks

Nature has an extensive article on the 'deception detection training' that's been widely rolled out for airport security staff and anti-terrorism police despite that fact that is has barely been publicly tested. Link to Nature 'Airport security: Intent to deceive As we reported in 2007, a great deal of this training seems to be based on psychologist Paul Ekman's various methods for focusing on facial expressions as a way of improving the ability to detect lies.

Tear the walls down: Jericho and the future of enterprise tech

Ross Dawson

As Jericho Forum puts it: The huge explosion in business collaboration and commerce on the Web means that today’s traditional approaches to securing a network boundary are at best flawed, and at worst ineffective. Increasingly, information will flow between business organizations over shared and third-party networks, so that ultimately the only reliable security strategy is to protect the information itself, rather than the network and the IT infrastructure.

risk?

Dave Snowden

What even fewer people know about is a key moment that happened in Japan when Steve Jobs approved a $10 million dollar expenditure that secured a key piece to their disruptive innovation at that time… the iPod 1.

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

Data 68

Platforms, Blockchains, and the Evolution of Trust

Irving Wladawsky-Berger

Blockchain technology is ultimately a means for individuals to coordinate common activities, to interact directly with one another, and to govern themselves in a more secure and decentralized manner.”.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor. The inherent linearity and security of SP may have specific value in the context you noted.

soft skills are permanent skills

Harold Jarche

Network Security Expertise. Are soft skills the new hard skills? I asked this question six years ago. I would suggest that hard skills are really temporary skills. They come and go according to the economy and the state of technology.

Skills 121

One More Industry Where Employment is Dropping as Output Rises

Andy McAfee