Thinking About Security

Wednesday, April 22, 2026

Computer Security

›
When I started in this field that we now call cybersecurity, we called it Data Security and Privacy.  In these seventy years it has had a nu...
Wednesday, April 15, 2026

Artificial Intelligence

›
This blog post is a work in progress.  Comments are solicited.  It is an attempt to bring my seventy years of experience in using, governing...
Friday, February 6, 2026

Enterprise Network Security

›
Taking only the success of ransomware for evidence, one infers that too many of our enterprise networks are flat. There is a path between ev...
Thursday, December 11, 2025

Bits are Bits

›
 N IST Cannot quite get it right.  They have gone from encouraging the use of special characters to discouraging them and relying only on pa...
Wednesday, September 17, 2025

Security Now

›
It is Tuesday evening.  I am listening to Security Now .  If you are not, I recommend that you do so.   Security now features  Steve Gibson ...
Wednesday, September 10, 2025

iPadOS 26

›
  The geeks have been militating to make iPadOS more like Mac OS, Android, or even like Windows.   This frightened me.   I take comfort from...
Monday, September 1, 2025

Attack Surface Managment

›
  Thanks to our colleague, Ben Carr, for the idea and the title of this post.  I wrote most of what follows in response to a post of his on ...
›
Home
View web version

Contributors

  • William Hugh Murray, CISSP
  • Yusud
Powered by Blogger.