Blog

Cybersecurity, yeah!

This is how you do it:
20140610_124346
[As spotted in Voorburg. No, not ‘shopped a single bit.]

Yes, indeed, this is how your ‘cybersecurity’ (#ditchcyber ! #wegmetcyber !) compares to the real deal. But hey, if you want to believe you’re up there with the Big Boys, go ahead. I won’t stop you from your own make-believe. At kindergarten.

Seth and you

Seth Godin posted this little piece on the outliers among us. Or even – outsiders.

The real question now is: What is it that you are the innovator in ..? If you can’t think of anything, think harder. If still, you may be the deadwood, the replaceable, superfluous non-individual. Consuming resource, hence on balance non-efficient existence to be erased.
But I bet you can find something …!?

And a piece of beauty:
dudokhsumlinkshuge
[Hilversum. Ergo, Dudok.]

CIAAEE+P

Privacy came to the fore last week, at a very interesting ISSA NL event.
Where we discussed the prevalent Confidentiality-Integrity-Availability approach (where impacts mandatorily regard the data subject(s), not you the processor, as the data subjects are legally owner of their info …!) and whether those three actually cover privacy aspects sufficiently.

Well, we did conclude that for now, CIA is ‘still’ the common denominator. But … hey, Auditability might be added, as that’s a sort-of requirement throughout privacy protection. And Effectiveness and Efficiency – of the data handling! – have a place as well, being representative of proportionality and legal-grounds-for-the-privacysensitive-data-handling-in-the-first-place (i.e., real purpose / purpose limitation!); if you collect more than very, very strictly necessary, you’re culpably inefficient in a hard legal sense, and at least part of your data handling is not effective.

But should we add Privacy as yet another factor ..? Does it have value in itself? Initially, I thought so, as the common CIA somewhere will always have lost its connection to information value, e.g., through the Bow Tie effect and other deviations (lagging) from modern developments.

Which I’ll discuss below. But now, first, an intermission picture:
OLYMPUS DIGITAL CAMERA
[Yup, Whistler]

So, as said, Privacy may be covered by CIA. But, … with specific deviations of interpretation. Continue reading “CIAAEE+P”

Can’t have your cake

I guess you can’t have your space cake and eat it over your keyboard.

If only they’d hire me. I bring [1337 hacker skillz and dope use]negated; not-fully and absolute none, respectively.

But then, …:
DSCN1297
[Beeb]

Aweariness.

Tweeks ago, at this successful! symposium, I noted the developments in the Awareness side of our IRM business. Multiple speakers were onto the subject without hesitating to move beyond the mere annual poster campaign for awareness, and moving into the daily-normal subconscious behavioral change work that was for a long time so much lacking. From ISO 2700x as well.

Which of course is a very, very good thing. Before the 80% of hard work in IRM as such (after discounting the first 80% in hardcore information security), the 80-100% of effort should go into this socio-/psycho-/behavioral fluffy stuff that yields so many benefits and returns. Though we ‘still’ may not be good at it, at least there is development, and leading examples. Thanks, speakers, for that; and for now:
DSCN1807
[Your guess. No, not Paris, Reims; not even Strasbourg and that’s a hint]

On the verge of many breakthroughs

Just to note; my feels are that this piece on scientific analysis on the verge of chaos is an emergent technology for many current applied fields. E.g., analysis of where the Internet of Things will bring us; Singularity or not, or what. And brain analysis obviously in the first place. But also sociologically, I see many applications just beyond the horizons.

And, of course:
DSCN5710
[Somewhat hidden, still a Major Place]

Wired / Tired / Expired, June 2014 edition

DSCN5735
[A mixed bag but me know nothing, I’m from Barcelona Madrid]

So, here’s the June edition of my Wired / Tired / Expired jargon watch overviews, a mixed bag:

WIRED TIRED EXPIRED
#ditchcyber APTs Cyber! Cyber! Cyberthis, cyberthat, cybereverywhere
Most certainly, this is still W.
Maybe shouldn’t have been. But is.
They were meant to be here to stay.
So they do.
There’s even an interesting popular song about this!
Mind-controlled bionics / Sensors (tie) IoT / Wearables Weaponised drones / Drones for deliveries
Once these get sorted out, we’re all doomed. Because we’ll not prep our society in advance of quick enough. Fact, from history.
After this, Fukuyama will be right after all.
All talk, no full-scope delivery. Laggerd panic, these ones.
White asparagus Green asparagus Noma
The ultimate, from the Aragon to Holland reach. Underestimated, neglected, by those who don’t know the product well enough. Not ‘the’ asparagus. Just the typical second choice. Eat your own ants. Exposure of decadence.
Drought in CA CO weed LGBT =
After the tiny snow pack, drought throughout CA and neighbouring states. See the panic. Dude, relax! Done deal, mellow! Equality spreading, overdue, now an unstoppable avalanche. Hence E.
BnpzKOsCMAAQYBm NAkjglc h626FCB52
In its lens- and other forms. Yes there’s innovation in there …! As Coin, still under W, though Overused

OK, any suggestions for next month’s edition ..?

Maverisk / Étoiles du Nord