There are some amazing god-like individuals out there, who spend their days understanding the market, interviewing the vendors, and issuing unbiased reports on various sectors. They go by catchy names such as “Magic Quadrant”, “Wave”, and in one somewhat cynical case that must have escaped the legal beagles, the “Hype Circle”. And of course, Information Security is no exception.
Whats on the blog, dog?anonymity bitcoin blackmail BT censorship certification Code computer security computer society cool tools cryptography current affairs cynicsm data protection extortion facebook forensics Fraud government happiness humour identity information warfare innovation internet knowledge Life Linux malware music network News online dating PCI DSS privacy psychology Scam Second Life shredders social media spam tango Uncategorized virus work youtube
Weeks most popular posts!
- Ping? Why do I need to block ping?
- Never gonna give you up
- Raising the bar in 2014 – keep it simple
- What happens in a breach?
- iPhone location consolidated.db to Google Earth KML
- Breach notice – securitypractice.com
- Incitement to violence
- Twitter knows where you live, silly
- Guest post : bitlicense
- UK Cop Humour