Threat Modelling: The Now of IT

Threat modelling was the subject of the latest Virtualization Security Podcast (which I am still trying to upload, so time for a new service). Threat modelling is what every security person does, but not necessarily formally. Threat modelling in many ways takes an architecture and looks for well-known threats. One such threat that could come …

Unplanned Obsolescence – Digital Lifespan

Recently, the xkcd comic (https://xkcd.com/1909/) mentioned digital lifespan with a pithy comment about digital resources disappearing quickly. This is quite prevalent in the project to restore NASA records from Apollo missions, such as LOIRP. NASA participated in unplanned obsolescence as well as misunderstanding the value of its data. It picked data formats that were not …

Process, People, Ptechnology, and Politics

The four Ps of security, DevOps, Agile Cloud Development, and cloud migration are Process, People, Ptechnology, and Politics. In that order. The Ptechnology piece is by far the easiest piece, though it is often considered to be critical. Without Process and People, at this time, technology is just a bunch of 1s and 0s. Unfortunately, …