Quantcast
Channel: Security – Christopher Budd
Browsing all 17 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Ten Years After Bill Gates’ Trustworthy Computing Memo

Ten years ago yesterday, Bill Gates sent out his Trustworthy Computing memo that marked a significant change in the culture at Microsoft and put security, privacy and reliability at the center of the...

View Article



Image may be NSFW.
Clik here to view.

Facebook and Online Dating Security

Two new postings from me today on Facebook and online dating security. Over at Windmill Networking, this month’s column is on Facebook pages and two things that you can do to improve your security and...

View Article

Image may be NSFW.
Clik here to view.

Interviews on the Anthem Data Breach

I had a chance recently to talk with reporters from the Associated Press and the Hill about the recent Anthem data breach and what that means for online security and privacy for healthcare and what...

View Article

Image may be NSFW.
Clik here to view.

Interview on KIRO 7 Seattle on Social Media Scams

I had a chance to talk with KIRO 7 news in Seattle recently about the current crop of social media scams plaguing Facebook, Twitter and Pinterest. Do you know what not to click on Facebook, Twitter?

View Article

Image may be NSFW.
Clik here to view.

A Trip to the Doctor

Or, more accurately, the local urgent care clinic. I had to make a trip there today to get looked at for the latest crud that I’ve been battling for the last week. My check-in was a good example of how...

View Article


Image may be NSFW.
Clik here to view.

Comments on the Stratos Digital Wallet Card

I got to talk with KIRO Radio here in Seattle recently about some of the risks with new, untested digital wallet cards like the new offering from Stratos. Plus, my comments on how cash may make a...

View Article

Image may be NSFW.
Clik here to view.

Comment Article on the Clinton Email Server Issue

My latest posting over at Geekwire is my analysis and commentary on why Hillary Clinton using a “homebrew” email server is a major security problem....

View Article

Image may be NSFW.
Clik here to view.

Clinton Press Conference Transcript: Email Security Sections

For those following the Clinton Email Situation, I’ve gone ahead and taken the full press conference transcript that Time posted and have pulled out the sections that pertain specifically to questions...

View Article


Image may be NSFW.
Clik here to view.

Clinton Official Statement: Email Security Sections

Following up my posting of the relevant section of the press conference transcript, Business Insider has posted the full official statement as well. Here are the relevant sections related to email...

View Article


Image may be NSFW.
Clik here to view.

“Hackback”: A New Approach

Today we read about the likely death in a drone attack of an ISIS hacker/warrior/cyber-jihadist:...

View Article

Interview on Hacker Valley Studio

I had the pleasure of being interviewed by Ronald Eddings and Chris Cochran with Hacker Valley Studio talking about crisis communications and lessons learned from “making awful news just bad” in their...

View Article

New Proofpoint Blog Post: Back to School Online: 5 Steps to Better Protect...

As we get ready for back to school, I just posted a new blog on the Proofpoint blog: “Back to School Online: 5 Steps to Better Protect Your Children“.This posting covers five things you can do to help...

View Article

Interview with BBC Online

I recently got to talk with Joe Tidy with the BBC Online about my work as a volunteer along with others as part of the University of Chicago’s Harris School of Public Policy Election Cyber Surge...

View Article


Geekwire Article on Amazon Sidewalk

For my latest article on Geekwire, I dig into Amazon’s plans for their new Sidewalk offering looking at how they’ve chosen to deploy it using “forced opt-in”, how that mirrors and differs from...

View Article

New Geekwire Article: How the SolarWinds hackers are targeting cloud services...

In my latest Geekwire article “How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack, I continue looking at the SolarWinds event, this time digging into the SAML token...

View Article


The Five Stages of “Hacked”

[Note: This scale is now posted on its own page here.] While doing some work around the SolarWinds hacks, I realized that there’s just no simple triage scale that we in the industry can use to simply...

View Article

New Geekwire Article: How hacked is hacked? Here’s a ‘hack scale’ to better...

My latest article is up on Geekwire: How hacked is hacked? Here’s a ‘hack scale’ to better understand the SolarWinds cyberattacks. In this article I apply my “Five Stages of Hacked” to the ongoing...

View Article

Browsing all 17 articles
Browse latest View live




Latest Images