Idoneous Security

i·do·ne·ous [ahy-doh-nee-uhs] adjective: appropriate; fit; suitable; apt.

Thursday, November 21, 2013

What's my name? No, really, what is it?

›
[Warning: rant ahead. Slow to impulse power, Mr. Sulu.] Ever since I've been responsible for user-facing applications -- which is prob...
Friday, July 26, 2013

Things I've learned about CFPs.

›
Here are some great tips in this article on how to submit to calls for papers (CFPs). I'd like to add a few more, based on my own exper...
Thursday, June 20, 2013

Sauce for the gander.

›
I attended the Dell annual analyst conference a couple of weeks ago, and was privileged to witness something that made me extremely happy. ...
Monday, June 10, 2013

If at first you don't succeed, FAIL, FAIL again.

›
Here's an example of security FAIL at its finest. I have an account for a service online, for which I have to manage things for the re...
Tuesday, May 21, 2013

The view from the other side.

›
Many thanks to Wim Remes, (ISC)^2 board member, for sending me his view of the cert issue and for letting me post it here. DISCLAIMER : this...

Going paperless.

›
UPDATE :  Boy, this generated a lot more response than I had anticipated. Let me make it clear: I really respect and admire what members o...
Friday, March 1, 2013

The data cleanse.

›
Everyone talks about the evils of multitasking, and everyone still does it. I'm becoming convinced, though, that the problem isn't m...
‹
›
Home
View web version

About Me

Wendy Nather
Former analyst and CISO in the public and private sectors, now mild-mannered threat intelligence research director by day. I'm not speaking for anyone but myself here. Warning: may contain snark.
View my complete profile
Powered by Blogger.