Dave Snowden

The post Security? I had three presentations today and my voice held up, just. I’ve had a bad cold for weeks and jumping time zones is not the best way to shake that off. But I fell back on a trusted recipe of lemsip, whisky, throat sweets and a degree of self-delusion as to my condition. The latter quality links with the small rituals that put you into role as you go on stage.

Adventure & security

Dave Snowden

Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. So new wine for new wineskins, it's a simple test and while it has a delight of adventure it is far from secure. It's Thursday so it must be Bangkok more or less summarises this week which is a series of 1/2 night hotel stays.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

“Countries that can harness the current wave of innovation, mitigate its potential disruptions, and capitalize on its transformative power will gain economic and military advantages over potential rivals,” was the top finding of the Innovation and National Security Task Force which was commissioned by the Council of Foreign Relations (CFR) to assess the current state of US technological innovation. economic competitiveness and national security.”.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The interconnectedness and openness made possible by the Internet and broader digital ecosystem create unparalleled value for society,” notes the report in its Executive Summary. “But these same qualities make securing today’s cyber landscape difficult. Why wasn’t stronger security designed into the original Internet infrastructure?

online privacy and security

Harold Jarche

As the internet becomes an essential part of lives — enabling us to access government services, connect with friends, and earn a living — there are frustratingly few ways to maintain privacy or security online. Companies that control a large part of the web traffic — Google, Facebook, Amazon — can pretty much do whatever they want with our data. And now American internet service provides can sell customer information to the highest bidder.

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. “With enough ‘security,’ corporate or national, you can utterly kill freedom, production capacity, and morale.” Tweet Here are some of the insights and observations that were shared via Twitter this past week. “1 tip for managing creative people: don’t.” ” @flowchainsensei. “The amount of failure that can be tolerated is directly proportional to the amount of innovation needed.”~

cooperation, measurement, security and more

Harold Jarche

Every fortnight I curate some of the observations and insights that were shared on social media. I call these Friday’s Finds. hrheingold : “Don’t refuse to believe; refuse to start out believing.” ” #crapdetection. nielspflaeging : “Any tool involving points and badges is superfluous, even systematically destructive in an organizational context.” ” @kjeannette : What is a Community of Practice? 6 lessons: 1) Narrow down the domain and purpose (i.e.

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

The article makes a strong case for flexicurity - shorthand for flexible security, - a social model from the Nordic countries which aims to achieve both flexibility in labor markets and security for workers. Like me, many workers enjoyed relatively secure, stable jobs and a number of company benefits, including health care insurance, vacations and retirement pensions. Entrepreneurship and flexible security.

Security Alert Related to Snowden?

Nine Shift

Is this weekend''s security aler t related to the Snowden case? Not one given to conspriracy, but we just have had the head of the NSA lie to Congress and the American public, with no penalty. Then we have Snowden pointing out that the head of the NSA lied to Congress and the American public, and he is considered a traitor worthy of life imprisonment. The attorney general had to declare publicly he would not be tortured. When has the US had to promise not to torture an American citizen?

Security vs. Utility

Doc Searls

icon icons location bar Mozilla security tool bar Starting a few upgrades back, Firefox started showing this… … when you clicked on that little icon at the left end of the location bar. What’s the name for that?) Now, with version 3.5.3 (and and perhaps earlier versions — the last one I used before this was 3.0.9), it still shows that same pop-down thing, but no longer selects the location text to the right.

Outside Security

Stephen Downes: Half an Hour

This , of course, is the inevitability that some terrorist somewhere will notice that the best targets today are in those heaving seas of tired, parched and irritable seas of humanity crowded immediately outside security. But we are supposed to trust these people who are managing our security for us. It is hard, very hard, to think of our national security forces as the enemy. Of our own security. I am not a specialist in security and defense and terrorism.

[shorenstein][liveblog] Juliette Kayyem on communicating about security

David Weinberger

Juliette Kayyem , a former Boston Globe columnist, a commentator, Homeland Security advisor to Gov. Deval Patrick, and a former candidate for governor of Massachusetts, is giving a Shorenstein Center talk about how to talk with the public about security issues. Juliette oversaw the local Homeland Security response to the Marathon Bombing and had participated in the security planning. She learned that last lesson from her security experience.

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are no longer adequate. the primer starts out by asking. “In an increasingly borderless and digital world, privacy and security cannot be ensured through the construction of walls around sensitive information. From time immemorial, our identity systems have been based on face-to-face interactions and on physical documents and processes.

If credit card companies cared about security…

David Weinberger

When there’s a security issue, they wouldn’t robocall people and ask them to provide personal information. They would robocall people and ask them to call the number on the back of their cards. They would put people’s photographs on their credit cards. Citi used to offer that as a free option, but apparently has discontinued the practice

Employee Training in Cyber Security: 4 Tips and Techniques


The current landscape of cyber security is frightening and implementing processes to tackle the growing problem seems daunting. 48 percent of data security breaches are caused by acts of malicious intent. After examining the current cybersecurity landscape, organizations have a very clear recourse: train end-user (non-IT) employees in cyber security protocols. Preventing many attacks is as simple as a few hours of security training. Security.

Smart and secure grids and militaries

David Weinberger

Andy is an MIT and DC energy tech guy (and, it turns out, a neighbor) who writes two blogs: The Smart Grid Security Blog and the DoD Energy Blog. Tags: ecology power military security experts The piece I wrote about Robin Chase prompted Andrew Bochman to send me an email.

We know we’ve traded away privacy. But for exactly what security?

Doc Searls

It has been said that “security” is not found in apprehending a guilty party but in preventing the harm from occurring. While this notion can surely be overextended, it can also be understood to justify a certain degree of intelligence gathering in the service of safety and security.

Deaf police to monitor security cameras in Mexico

Mind Hacks

Deaf police officers have been recruited to monitor security cameras in the Mexican city of Oaxaca because of their ‘heightened visual abilities’ There’s a brief and somewhat clunky English-language news article from the local paper that describes the project: Ignacio Villalobos Carranza, Deputy Secretary for the Ministry of Public Security of Oaxaca, said most of the monitoring of the 230 cameras is done by law enforcement officials that are hearing or speech impaired.

Your Twitter security is an egg, not an onion

Martijn Linssen

why not both Home About Contact Thursday, 13 January 2011 Your Twitter security is an egg, not an onion Hard to come up with a more fuzzy title really. In security models, an egg, with its very hard shell, represents a single barrier between the inside and the outside, that is very hard and tough - but once youre in, youre in. Business or Pleasure? -

Google: Make security the default (Now with Iranian tweets)

David Weinberger

Tags: google security iran twitter

Going #Faceless

Doc Searls

and the Department of Homeland Security.” Instead, Fourth, develop useful and constructive ideas toward what we can do— each of us, alone and together—to secure, protect and signal our privacy needs and intentions in the world, in ways others can recognize and respect. Customertech Digital Life policy Politics privacy security VRM #Faceless #GOOMF petittion surveillanceFacial recognition by machines is out of control. Meaning our control.

Citicard does its best to train us in horrible security practices

David Weinberger

Citibank continues to train its customers to use terrible security processes. This morning I got a call from a robot that claimed to be from Citibank. When I refused to type in my zip code, and then waited for two minutes of repeated requests to do so, it transferred me to a human who wanted me to give him my name and password. Thus does Citibank train its users to divulge personal information to anyone with an automated phone dialer.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto. Security is not convenient.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

The problem for people isn’t advertising, and the problem for advertising isn’t blocking. The problem for both is tracking.

Doc Searls

adtech advertising Business Identity Internet Journalism Law marketing privacy problems publishing securityIn Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking , @JuliaAngwin and @ProPublica unpack what the subhead says well enough: “Google is the latest tech company to drop the longstanding wall between anonymous online ad tracking and user’s names.”

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Inside Britain's highest security psychiatric hospital

Mind Hacks

The Independent has an article giving a rare look inside Broadmoor Hospital , one of only four high security psychiatric hospital in the UK, which houses some of the most severely dangerous offenders with mental illness. Broadmoor is the oldest and most well-known high secure hospital in Britain, having housed a string of high profile murders and other violent offenders since Victorian times to the present day.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. You are not secure. Summary of a talk by Parry Aftab at the IFIPTMA Conference in Moncton. It is important that you know why I am so trustworthy. I am the most trustworthy person on the internet. A recent widow in Nigeria wrote to me and told me so. I get all these emails. So I must be trustworthy.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages. Look at security.

Airport psych security: snake oil on a plane?

Mind Hacks

Nature has an extensive article on the 'deception detection training' that's been widely rolled out for airport security staff and anti-terrorism police despite that fact that is has barely been publicly tested. Link to Nature 'Airport security: Intent to deceive As we reported in 2007, a great deal of this training seems to be based on psychologist Paul Ekman's various methods for focusing on facial expressions as a way of improving the ability to detect lies.

Help: why don’t images load in https?

Doc Searls

Berkman Blogging Harvard Internet problems publishing securityFor some reason, many or most of the images in this blog don’t load in some browsers. Same goes for the ProjectVRM blog as well. This is new, and I don’t know exactly why it’s happening. So far, I gather it happens only when the URL is https and not http. Or so I gather. Okay, I’ll try an experiment. I’ll add an image here in the WordPress (4.4.2)

Are Your Social Media and Other Accounts Secure?

Beth Kanter

So, how can you make your social media and other account more secure? For Google, it’s under Account -> Security -> 2-step verification. For Facebook, it’s Account Settings -> Security -> Login Approval. Twitter, it’s under Account -> Account Security -> Require a verification code when I sign in. Every so often, it is a good idea to do security and privacy assessment of your Internet presence.

About face

Doc Searls

If that person returns in the future and the facial-recognition software detects them, security will be dispatched to ask the gambler to leave.” For example, in Barcelona, CaixaBank is rolling out facial recognition at its ATMs, claiming that 70% of surveyed customers are ready to use it as an alternative to keying in a PIN, and that “66% of respondents highlighted the sense of security that comes with facial recognition.” We can know more than we can tell.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor. The inherent linearity and security of SP may have specific value in the context you noted.

The State of Financial Health Around the World

Irving Wladawsky-Berger

Conducted by Gallup in partnership with the MetLife Foundation and the Rockefeller Philanthropy Advisors , the study aimed to develop two key financial measures: how secure do people feel around the world, and how much control and influence they believe they have over their financial situations. While researchers have developed valuable measures of financial inclusion and financial literacy, data on financial security and control have never existed before.

Harold Jarche » Hockey meets social networking

Harold Jarche

Could AI Reshape the Global Balance of Power?

Irving Wladawsky-Berger

The National Security Commission on Artificial Intelligence (NSCAI) was established by the US Congress in Fiscal Year 2019 to “advance the development of artificial intelligence, machine learning, and associated technologies by the United States to comprehensively address the national security and defense needs of the United States.” AI has the potential to significantly advance national security. Apply AI to National Security Missions.

e-Clippings (Learning As Art): Zone Alarm Listen UP!! This is NOT Customer Service!

Mark Oehlert

Normally I run Zone Alarms security suite of products and I generally think they are the best out there - they are certainly better than Norton in terms of being Norton being such a resource hog. RIGHT-click on Uninstall ZoneAlarm Security, then select Properties 04.) Click on Start -> Programs -> ZoneAlarm -> Uninstall ZoneAlarm Security 07.) Click Uninstall to run the uninstaller, and choose OK or yes to any security alerts that pop up.

The Real Business of Blockchain

Irving Wladawsky-Berger

Blockchains support the secure exchange of value in the form of tokens. “Tokens might function as digital representations of physical assets, as a reward mechanism to incentivize network participants, or to enable the creation and exchange of new forms of value.”.

3 Problems COVID-19 Created for Corporations (and How eLearning Helps)


Because it came on suddenly and with a vengeance, the global health crisis severely impacted corporations’ bottom lines, levels of information security, employees, and more. The COVID-19 pandemic has caused problems for organizations worldwide. The good news is that eLearning can be instrumental in helping organizational leaders overcome these issues. Business Performance COVID-19

e-Clippings (Learning As Art): "Is Web 2.0 Safe?" (MSN article)

Mark Oehlert

MSN article) Here is the shocking synopsis of this article : Security needs to be better in Web 2.0 Yes, its true that as more data is stored in the cloud, then the cloud needs to be better secured and we need to look at how our browsers are allowed to interact with our computers (although no using browser code as part of the genetic base for your OS might be a start).

e-Clippings (Learning As Art): Good for introNetworks!

Mark Oehlert

introNetworks Secures $2.7 e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Fleck.Web page annotation | Main | Great Web Comic and the Guy Gets Fired!? » May 17, 2007 Good for introNetworks!

The Transformative Power of Blockchain

Irving Wladawsky-Berger

It succinctly defines blockchain as “a shared, decentralized, cryptographically secured, and immutable digital ledger,” and then adds a few key attributes that are particularly important to enterprise blockchains: Accountability. Security. “Enterprise blockchains are fault-tolerant. But, to keep InternetOne as simple and flexible as possible, just about everything else, - including identity and security management, - became the responsibility of the applications in InternetTwo.