-
Recent Posts
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 3)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 2)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 1)
- Incorporating Disruptive Technologies into Existing Products
- Investing in Disruptive Technologies
Articles
Major articles in chronological order:
Archives
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- November 2019
- October 2017
- August 2017
- July 2017
- November 2016
- July 2016
- June 2016
- August 2015
- July 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
Categories
Monthly Archives: August 2014
Yellow Sticky of Doom Revisited
Our last post introduced The Yellow Sticky of Doom. Talking with security experts about the Yellow Sticky of Doom shows that the situation isn’t entirely bleak. They agree that posting notes on a monitor – or the bottom of a … Continue reading
Posted in Security
Leave a comment
Greatest Threat: Yellow Sticky of Doom
The previous post looked at man-made physical threats. We now get to what I consider the greatest threat to computer security: the Yellow Sticky of Doom! Passwords written down on yellow sticky notes. These are everywhere. What is the difference … Continue reading
Posted in Security
5 Comments
Threat: Joe the Backhoe Operator
The previous post considered forces of nature – we also have man-made threats: Where Dennis the Weatherman is a proxy for all the threats nature can pose, Joe the Backhoe Operator is a proxy for man-made threats outside the data … Continue reading
Posted in Security
Leave a comment
Threat: Dennis the Weatherman
We last looked at an inside threat – now let’s consider some external threats: Dennis the Weatherman is a proxy for the threats that nature presents. Superstorm Sandy is a recent example of the power of weather. Some places received … Continue reading
Posted in Security
Leave a comment
Threat: Dave the Service Technician
The previous post looked at users and the unintentional threats they can create. Now let’s get hands-on with the systems: Dave is responsible for adding, upgrading and repairing systems. Without Dave, things will quickly go downhill in your data center. … Continue reading
Posted in Security
Leave a comment
Threat: Sally the User
Unlike Sam the Disgruntled Employee from our last post, Sally doesn’t have an evil bone in her body. She is dedicated, hardworking, helpful, and committed to doing a good job. Unfortunately, she doesn’t completely understand how the system works, and … Continue reading
Posted in Security
Leave a comment