Every day an article about BYOD is posted. More or less the topic is always the same: “BYOD and companies security plans“, “BYOD and internal security”, “BYOD, to do or not”… What I found that is really missing in this plethora of posts is someone talking about “BYOD and working hours”. My question is: how can I deal with […]
“No I didn’t. Honest… I ran out of gas! I–I had a flat tire! I didn’t have enough money for cab fare! My tux didn’t come back from the cleaners! An old friend came in from out of town! Someone stole my car! There was an earthquake! A terrible flood! Locusts! IT WASN’T MY FAULT, I SWEAR TO GOD!!!” This is […]
More than a couple of months ago, all security an network engineers, has been involved with the Heartbleed’ Bug. A huge number of applications and appliances was affected by this bug. In the immediate, everyone was rushing and checking their stuff for the bug’s presence and the available patch. Few weeks later, the situation seems to be not that better, and […]
White House Big Data Report Uncle Ben is a sort of icon for all of Spiderman’s fans and his famous sentence, as well. Reading this post my mind has jumped immediately to this sentence. Just have a look to one of the first phrases: “big data analytics have the potential to eclipse longstanding civil rights protections”. This is what I […]
So, as far as eBay denies the authenticity of a stolen database, another problem is arising quite quickly: BitCoin security usage. Apart from a couple of security issues (two months to discover the hack and 145 million users potentially exposed), my thought wander upon the BitCoin’s topic.