What we're reading, week of 6/30

From Schneier on Security… Security and Human Behavior Bruce Schneier contributes this very thought-provoking post from the first “Security and Human Behavior” workshop, prompting a discussion of how perception and human psychology affect not only the way people...

What we’re reading, week of 6/30

From Schneier on Security… Security and Human Behavior Bruce Schneier contributes this very thought-provoking post from the first “Security and Human Behavior” workshop, prompting a discussion of how perception and human psychology affect not only the way people...

What we’re reading, week of 6/23

From JJ’s Security Uncorked… Network Based Entitlement… A Rose by Any Other Name JJ reviews Rohati’s recently-announced “Network-based Entitlement Control,” drawing the conclusion that Rohati’s approach to NAC is no different than what can already be...

What we're reading, week of 6/23

From JJ’s Security Uncorked… Network Based Entitlement… A Rose by Any Other Name JJ reviews Rohati’s recently-announced “Network-based Entitlement Control,” drawing the conclusion that Rohati’s approach to NAC is no different than what can already be...