Tag Archives: double secrets

Non Dad Bots

With all the attention having gone to the not-so-Russian-or-are-they hacks, and some ransomware and CES17 news, over the past couple of months, one could have forgotten that not too long before, there was the wavelet (not like this) of hype … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Privacy | Tagged , , , , | Leave a comment

Fake-fake-fakes

[Edited to add: this, I wrote a month+ ago, and has of course since been ‘repeated’ over and over, e.g., through the poor Swedes not knowing what hit them…] Not quite like this, but troublesome: The information explosion brought to … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , , , | Leave a comment

Secret Health

The year hasn’t started in earnest, and already we’re swamped in news about the over-easy hackability in and/or frequent leakage of medical data from the Care sector — haha we aren’t swamped but rather, quite ignore the news because either … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Privacy | Tagged , , , | Leave a comment

Cozy versus Anti-cozy

Once more reaching back to last Wednesday’s post: Opposing sides may have to recognise the very existence of the other one. When anti-bureaucracy force battle the eternal struggle against complacency et al., they better take into account that 60% of … Continue reading

Posted in ERM, GRC, Information Risk Management, Sociological, psychological notes | Tagged , , , , , | Leave a comment

DoS Internals

No, no typo. Not DOS Internals or so. Rather, internal DoS attacks. Are they tractable? [Uhh, that may sound like they’d be positive things to be able to do — sorry, just hinting at “technical feasibility” here] Yes they are. … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , , , , , , , , | Leave a comment

Did / Did Not (Know Who Did)

Anyone still have an overview of where we (?) stand qua attribution of “cyber” attacks [ #ditchcyber, of course ] ..?? Apart from this… There’s so much development in attribution with or without proof, e.g., about hacking elections in some outer … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Sociological, psychological notes | Tagged , , , , , , , , , , , , , , , | Leave a comment

Two’s a Charming Bureaucratic Voilence

First, two (yes) quotes: To put it crudely: it is not so much that bureaucratic procedures are inherently stupid, or even that they tend to produce behaviour that they themselves define as stupid — though they do do that — … Continue reading

Posted in Books by Quote, ERM, GRC, Information Risk Management, Sociological, psychological notes | Tagged , , , , , , , | Leave a comment