There are some amazing god-like individuals out there, who spend their days understanding the market, interviewing the vendors, and issuing unbiased reports on various sectors. They go by catchy names such as “Magic Quadrant”, “Wave”, and in one somewhat cynical case that must have escaped the legal beagles, the “Hype Circle”. And of course, Information Security is no exception.
Whats on the blog, dog?anonymity bitcoin blackmail censorship certification Code computer security computer society cool tools cryptography current affairs cynicsm data protection extortion facebook forensics Fraud government happiness hardware humour identity information warfare innovation internet knowledge Life Linux malware music network online dating PCI DSS people privacy psychology Scam Second Life shredders social media spam tango Uncategorized virus work youtube
Weeks most popular posts!
- Ping? Why do I need to block ping?
- Never gonna give you up
- Today, young Jimmy finds out that life is not like alt.sex.stories
- Papa got a brand new pineapple
- What happens in a breach?
- With Ross, you’re the boss
- Do you Lastpass?
- Google makes Child Porn a little bit worse
- Please don’t encrypt