Apple Inc.

Happy new insecure 2017: my resolutions and wishlist for new year

Here we are, a new year comes and we, as cyber security expert, will keep warning the world about the deeply insecure world we are living. And we will announce new technologies and new devastating scenarios related to new technologies. IoT and Cloud will rise their evil face while bad people will be lurking in the dark waiting to attack the innocent lamb crossing the road. But, in all of this, the most of the damage will be still done by bad designed systems, by managers that does not understand what means living in a digital world, by politicians that…

Cryptography, keeping on the big lie

So Cryptography would be a National Security Issue? I’m tired to be polite and politically correct when talking about encryption. Let us be clear and honest, all those crypto_war is a pile of crap. Every time I heard someone claiming that we should not enforce strong cryptography I wonder: to they have the slightest idea what they are talking about? Probably not, considering also most of the objections against cryptography I heard. Listening to those “enlighten” minds it seems that without cryptography the world be a sort of heaven where intelligence could have the possibility to solve any criminal case. And…

The IoT Files: The need for cryptography

The IoT Files: The need for cryptography One of the main arguments that should be touched by IoT discussion is cryptography. There is an undisputed consensus that cryptography is a mandatory requirement to preserve security and privacy in the IoT world, but we are far away for a general consensus on how to operate. The need for cryptography in IoT comes from two main aspects: Data security Data privacy The first need is clear; encryption is a mandatory requirement when we want to implement any form of authentication and non repudiation. Encryption is widely used even if we don’t know…

Historical memory, what is this about?

I wrote on memories yesterday. Personal memories and historical memories are the blocks of our life. We live for our memories since, at the end, are memories that create our thinking, our background, our experience, our knowledge. Personal memories are something ease to understand, is what we directly lived through direct experience. but those memories are just a portion of the memories we have and have to deal with. Another great portion of our memories is build into the society we are living, shaped trough communication (media, arts, word of mouth, storytelling), school and other tools. Some of those memories are…

weak manager style

In a previous post (http://www.thepuchiherald.com/2016/03/04/management-style-common-error-to-avoid/)  I tried to put some rationale on my thoughts about management, designing some of the characteristics a manager usually have (bad ones of course). One of the biggest “Ahas!” new and experienced managers (and the people who work for them) have experienced  is the realization that being a strong manager doesn’t mean being forceful or domineering. It’s just the opposite — strong managers are strong enough to lead through trust, whereas weak managers have to use the force of their job titles to make people listen to them. Most of the management style depicted (not…

Management style, common error to avoid

Management style, common error to avoid Being a manager is a hard job, and it deals with cultural, economical, corporate issues and rules. But being a manager is indeed an important job usually performed with a not clear idea on what a manager should do. We can find Bad and Good managers, and most of the times they do not even realize where they stand in the good or bad dashboard, because usually nobody teach you what to be a manger means. Nevertheless there is a world of literature on management, so If someone really want to improve from naïve…

The IoT Files – intro and security

The IoT Files – intro and security I will start a series of posts on the IoT (Internet o Things) since it seems me that most of the talking about IoT are missing some key aspects. I will start with a general introduction, taken from a webinar I delivered recently. There is a lot of rumors around IoT lately. It seems the new holy grail of the technology industry, the panacea that will solve every business pain and will drive us to the next point. All those talking are interesting, but somehow a little bit apologetic, since there is a…

A Fight for the future message: The following companies just betrayed billions of people.

The following companies just betrayed billions of people. Apple, Microsoft, Adobe, Symantec, and a handful of other tech companies just began publicly lobbying Congress to pass the Cybersecurity Information Sharing Act (CISA), a bill that would give corporations total legal immunity when they share private user data with the government and with each other. Many of these companies have previously claimed to fight for their users’ privacy rights, but by supporting this bill they’ve made it clear that they’ve abandoned that position, and are willing to endanger their users’ security and civil rights in exchange for government handouts and protection….

Security and Risks Updated

When I’m talking about security with customers, partners or at an event the first question I usually receive is: how much this will cost to me? This is an understandable question, costs have to be monitored and expenditures have to be planned wisely;  how much I can spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seemed to be attracted more by strange inner believes than an empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that…

Posts navigation
Stop censorship
%d bloggers like this: