Idoneous Security

i·do·ne·ous [ahy-doh-nee-uhs] adjective: appropriate; fit; suitable; apt.

Saturday, February 20, 2016

How Google turned me into my mother.

›
We are facing a big problem, one that's hidden behind the more prominent issues of cybercrime, encryption wars, and vulnerability disclo...
Tuesday, December 8, 2015

A matter of taste.

›
I've figured it out: The word "cyber" is like garlic. For most palates, just a bit of cyber in anything is enough. It makes ...
Wednesday, November 25, 2015

Why the airplane analogy doesn't fly.

›
Don't get me wrong — I love Trey Ford. He is one of the most inspiring infosec pros I know. He's smart, creative, full of mind-blowi...
Monday, September 7, 2015

When your risk profile is different.

›
Ready for some (more) unfounded speculation? Both people and organizations tend to want to keep their data within a circle of trust; it...
Saturday, May 16, 2015

Lessons in grown-up security.

›
Okay, so for the sake of those who can't say anything, I feel I have to say something. Remember how much you hate people talking about...
Friday, April 24, 2015

Achievement unlocked?

›
This week was Hell Week for analysts, otherwise known as Meet All The People, Inspect All The Things, otherwise known as the RSA Conference....
Tuesday, January 27, 2015

Looking logically at legislation.

›
There's a lot of fuss around the recent White House proposal to amend the Computer Fraud and Abuse Act, and some level-headed analysis o...
›
Home
View web version

About Me

Wendy Nather
Former analyst and CISO in the public and private sectors, now mild-mannered threat intelligence research director by day. I'm not speaking for anyone but myself here. Warning: may contain snark.
View my complete profile
Powered by Blogger.