April 2017

This image isn’t Saturn’s Rings, but an image of Saturn from its pole to equator. Sadly, many of the sites reporting on Cassini’s dive through Saturn’s rings — I’m going to say that again — Cassini’s first dive through Saturn’s rings — don’t explain the photos. I’ll admit it, I thought I was looking at…

Read More Cassini

There’s a very interesting paper on the Cyber Grand Challenge by team Shellphish. Lots of details about the grand challenge itself, how they designed their software, how they approached the scoring algorithm, and what happened in the room. There’s lots of good details, but perhaps my favorite is: How would a team that did *nothing*…

Read More Cyber Grand Shellphish

Access to an account is access to an account. A lot of systems talk about “backup” authentication, but make that backup authentication available at all times. This has led to all sorts of problems, because the idea that the street you grew up on is a secret didn’t make sense even before Yahoo! “invalidated“it. Not…

Read More Account Recovery

There’s an interesting report out from the Cyentia Institute, which is run by Wade Baker and Jay Jacobs. (Wade and Jay were amongst the principals behind the Verizon DBIR.) It’s “The Cyber Balance Sheet.” It’s interesting research and if you spend time with executives, worth your time.

Read More Cyber Balance Sheet

When I started blogging a dozen years ago, the world was different. Over time, I ended up with at least two main blogs (Emergent Chaos and New School), and guest posting at Dark Reading, IANS, various Microsoft blogs, and other places. I decided it’s time to bring all that under a single masthead, and hey,…

Read More A New Blog

So I’m curious: on what basis is the President of the United States able to issue orders to attack the armed forces of Syria? It is not on the basis of the 2001 “Authorization for Use of Military Force,” cited in many instances, because there has been no claim that Syria was involved in the…

Read More Syria