<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-9126889845924473010</atom:id><lastBuildDate>Fri, 16 Jan 2026 00:46:45 +0000</lastBuildDate><category>Information Security</category><category>information centric security</category><category>antivirus</category><category>blogs</category><category>Andy the it guy</category><category>Firewalls</category><category>IT</category><category>predictions</category><category>the hoff</category><category>business</category><category>dlp</category><category>hackers</category><category>off topic</category><category>pci</category><category>2008</category><category>Information</category><category>alan shimel</category><category>backups</category><category>facebook</category><category>google</category><category>hacking</category><category>privacy</category><category>securosis</category><category>south africa</category><category>unix</category><category>2009</category><category>7 habits</category><category>Government</category><category>TJX</category><category>awareness</category><category>blogging</category><category>data breaches</category><category>enatis</category><category>hack</category><category>internet</category><category>itweb</category><category>microsoft</category><category>open source</category><category>passwords</category><category>press</category><category>risk</category><category>stephen covey</category><category>web</category><category>70s</category><category>90s</category><category>Blogger</category><category>CISSP</category><category>NAC</category><category>Security Bloggers Network</category><category>analogy</category><category>apple</category><category>cloud computing</category><category>governance</category><category>iso27001</category><category>legal</category><category>malware</category><category>me</category><category>money</category><category>policies</category><category>securiosis</category><category>small business</category><category>spam</category><category>symantec</category><category>the age</category><category>the times</category><category>worm</category><category>CIA</category><category>FNB</category><category>Fifth Annual Global State of Information Security</category><category>Nokia</category><category>PCs</category><category>ROI</category><category>aaron</category><category>applications</category><category>auditors</category><category>australia</category><category>ceos</category><category>client</category><category>cool technology</category><category>crime</category><category>dell</category><category>disaster recovery</category><category>dominic white</category><category>email</category><category>excel</category><category>expert</category><category>firefox</category><category>gartner</category><category>google gears</category><category>intellectual property</category><category>itweb09</category><category>linux</category><category>managament</category><category>mike rothman</category><category>moses</category><category>open standards</category><category>patching</category><category>perfect security</category><category>perfect storm</category><category>phishing</category><category>presentation</category><category>presidents</category><category>process</category><category>process-centric security</category><category>security conference</category><category>sox</category><category>steve jobs</category><category>the a</category><category>the future</category><category>torah</category><category>training</category><category>trojan</category><category>users</category><category>verizon</category><category>virtualisation</category><category>wsj</category><category>1970s</category><category>2007</category><category>2010 fifa world cup</category><category>3pics</category><category>ATMs</category><category>CIO</category><category>Conscious Competence Learning Model</category><category>DHCP</category><category>Data loss prevention</category><category>ECT Act</category><category>FAT</category><category>First National Bank</category><category>GPL</category><category>IBM</category><category>IRC</category><category>ISP</category><category>ITweb11</category><category>KPA</category><category>Kevin Kelly</category><category>Lotus</category><category>Manto Tshabalala-Msimang</category><category>NTFS</category><category>PC Inspector File recovery</category><category>PII</category><category>SLA</category><category>SSAATY</category><category>adrian lane</category><category>adsl</category><category>advertising</category><category>agility</category><category>amatomu</category><category>android</category><category>architecture</category><category>autopatcher</category><category>beetroot</category><category>big picture</category><category>bill gates</category><category>black and white</category><category>brandfail</category><category>breaking rules</category><category>bruce whitfield</category><category>business continuity</category><category>california</category><category>captcha</category><category>cd backups</category><category>cell phones</category><category>cellphone</category><category>ceo</category><category>christmas</category><category>chrome</category><category>chutzpah</category><category>clarity</category><category>communication</category><category>company</category><category>complaint</category><category>complexity</category><category>compliance</category><category>compromise</category><category>computers</category><category>conficker</category><category>contracts</category><category>control</category><category>costs</category><category>covey</category><category>crafts</category><category>crafty nook</category><category>creative commons</category><category>creativity</category><category>credit card</category><category>csip</category><category>cso</category><category>dark reading</category><category>deep thinking</category><category>department of transport</category><category>disclaimers</category><category>disk world</category><category>disqus</category><category>doctor</category><category>documentation</category><category>documents</category><category>dos</category><category>dr seuss</category><category>ducky</category><category>electricity</category><category>elucidate</category><category>employees</category><category>encryption</category><category>end point protection</category><category>eraser</category><category>first post</category><category>framework</category><category>freeware</category><category>fuel</category><category>fun</category><category>generations of security</category><category>genius</category><category>gmail</category><category>greg day</category><category>hanukkah</category><category>happy new year</category><category>harry potter</category><category>henry ford</category><category>home pc</category><category>homecoming revolution</category><category>hotmail</category><category>humans</category><category>ie6</category><category>ie7</category><category>image spam</category><category>incite</category><category>information classification</category><category>intermittent variable reward</category><category>introduction</category><category>ips</category><category>isc2</category><category>isg africa</category><category>itweb10</category><category>javelin</category><category>jeremiah grossman</category><category>jewishanswers.org</category><category>jobs</category><category>kevin mitnick</category><category>kitt</category><category>knight rider</category><category>kool-aid</category><category>kreepy krauly</category><category>law</category><category>leak</category><category>licenses</category><category>linus torvalds</category><category>liquid damage</category><category>listening</category><category>lord kelvin</category><category>losses</category><category>lucid</category><category>marriage</category><category>measurable security</category><category>measurement</category><category>messagelabs</category><category>metrics</category><category>microsoft office</category><category>model-driven</category><category>monitoring</category><category>mozilla</category><category>ms07-0056</category><category>mxit</category><category>netpc</category><category>networks</category><category>new idea</category><category>new york city</category><category>news</category><category>nick taylor</category><category>nirvana</category><category>p2p</category><category>paradigm</category><category>paris hilton</category><category>parisexposed.com</category><category>patch advise</category><category>patches</category><category>patient records</category><category>pdfs</category><category>pelzman effect</category><category>petition</category><category>petrol</category><category>phil zimmerman</category><category>philosophy</category><category>physical security</category><category>pin</category><category>piracy</category><category>police commemoration poetry</category><category>politics</category><category>presentation zen</category><category>pretoria news</category><category>productivity</category><category>project management</category><category>puzzle</category><category>rabbi seinfeld</category><category>rape</category><category>rapper</category><category>real world mirror</category><category>rebecca herold</category><category>remote</category><category>retail</category><category>richard bejtlich</category><category>richard stallman</category><category>risksm dos</category><category>rootkit</category><category>rules</category><category>sabsa</category><category>sans</category><category>saps</category><category>security 2.0</category><category>security catalyst forums</category><category>security in depth</category><category>security plan</category><category>security.com</category><category>separation of duties</category><category>servers</category><category>simplicity</category><category>sms</category><category>soho</category><category>spam. hackers</category><category>spin doctoring</category><category>spyware</category><category>standards</category><category>state of fear</category><category>state of risk</category><category>stealth hackers</category><category>stethoscope</category><category>stocks</category><category>strike</category><category>stripshow</category><category>sugar</category><category>sun</category><category>sunday times</category><category>swimming pool theory</category><category>symbian</category><category>telkom</category><category>temet nosce</category><category>terry pratchett</category><category>theft</category><category>tourism</category><category>tricks</category><category>twitter</category><category>viagra</category><category>virginia tech</category><category>vpn</category><category>vulnerabilities</category><category>wall of wisdom</category><category>web 2.0</category><category>website</category><category>wife. customer</category><category>wikipedia</category><category>windows</category><category>wrong</category><category>xml</category><category>yahoo</category><category>zimbabwe</category><title>Information Security Thoughts - Allen Baranov</title><description>A blog dedicated to thoughts about Information Security.</description><link>http://securethink.blogspot.com/</link><managingEditor>noreply@blogger.com (Allen Baranov)</managingEditor><generator>Blogger</generator><openSearch:totalResults>180</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-7643814215759418303</guid><pubDate>Tue, 20 Jan 2015 04:23:00 +0000</pubDate><atom:updated>2015-01-20T06:23:39.558+02:00</atom:updated><title>I got it right! (My timing was just off)</title><atom:summary type="text">I was looking at my old posts and found this prediction from 2009 for 2009:

http://securethink.blogspot.com.au/2009/01/prediction-number-1-for-2009.html

I essentially predicted that the market for cards would drop off and that "hackers" would start looking at stealing other information. Remember that, in most cases, they have access to the entire network. All the juicy intellectual property is </atom:summary><link>http://securethink.blogspot.com/2015/01/i-got-it-right-my-timing-was-just-off.html</link><author>noreply@blogger.com (Allen Baranov)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-8651645543874627703</guid><pubDate>Mon, 21 Jul 2014 23:17:00 +0000</pubDate><atom:updated>2014-07-22T01:17:43.772+02:00</atom:updated><title>How to save millions with desktop software!</title><atom:summary type="text">[The South African State IT Agency awarded former provincial top cop Mzwandile Petros's company a R10m deal to recover three stolen laptops. Even at this price, they may not get them back. Intact. With all the data. I have a better plan.]


Read this article on how the South African State IT Agency awarded former provincial top cop Mzwandile Petros's company a R10m deal to recover three stolen </atom:summary><link>http://securethink.blogspot.com/2014/07/how-to-save-millions-with-desktop.html</link><author>noreply@blogger.com (Allen Baranov)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-5219795401014701281</guid><pubDate>Wed, 27 Nov 2013 04:58:00 +0000</pubDate><atom:updated>2013-11-27T06:58:49.025+02:00</atom:updated><title>LinkedIn ethics</title><atom:summary type="text">[TL/DR version: Is it ethical to "connect" with an interviewer on LinkedIn during the hiring process?]

As a professional and a contractor, my name is my most important asset. So therefore ethics are everything to me. This is especially important because of the fact that I am an Information Security professional and usually have access to information that is confidential. I need&amp;nbsp;to be </atom:summary><link>http://securethink.blogspot.com/2013/11/linkedin-ethics.html</link><author>noreply@blogger.com (Allen Baranov)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-4920082818102390690</guid><pubDate>Tue, 04 Jun 2013 02:31:00 +0000</pubDate><atom:updated>2013-06-04T04:31:01.447+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">architecture</category><category domain="http://www.blogger.com/atom/ns#">Firewalls</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">policies</category><category domain="http://www.blogger.com/atom/ns#">sabsa</category><category domain="http://www.blogger.com/atom/ns#">security in depth</category><category domain="http://www.blogger.com/atom/ns#">standards</category><title>Slideshow: A Practical Example to Using SABSA Extended Security in Depth Strategy</title><atom:summary type="text">  

 A Practical Example to Using SABSA Extended Security-in-Depth Strategy   from Allen Baranov 

Following on from my last post, this is a practical way of using the extensions I proposed for the Security in Depth part of SABSA.

It gives an example of creating a Firewall Standard using the extensions.

I found this to be easier to do with a presentation than explaining it on the Blog so there </atom:summary><link>http://securethink.blogspot.com/2013/06/slideshow-practical-example-to-using.html</link><author>noreply@blogger.com (Allen Baranov)</author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.814107 144.96327999999994</georss:point><georss:box>-38.6164245 143.67238649999993 -37.0117895 146.25417349999995</georss:box></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-2287862439846350018</guid><pubDate>Mon, 20 May 2013 08:04:00 +0000</pubDate><atom:updated>2013-05-20T10:04:25.874+02:00</atom:updated><title>A more positive and comprehensive SABSA Strength-in-depth Strategy</title><atom:summary type="text">
[Extending SABSA's Strength-in-Depth Strategic Controls]


SABSA is brilliant. In one short week, I had my head expanded to exploding point. I highly recommend it to any Security person who is looking to understand more how what they do impacts on a Business.&amp;nbsp;


What is very interesting is that Business people understand risks. That is what they do. They understand governance and they also </atom:summary><link>http://securethink.blogspot.com/2013/05/a-more-positive-and-comprehensive-sabsa.html</link><author>noreply@blogger.com (Allen Baranov)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFKay0G5ZMYyyjP6Ct3MxwCbCOfaRYpjQ1exa9zmZ8qb-4ETwx0MBoXHE8YpqGXepPnrMSA0ofMjTbqZeL8OkjfVWepZ3rywxnuuqkRRxMEw9YaivBHMMpYgA3x2nrOqIYhjMamA2xzik/s72-c/extended+s-i-d.PNG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-6507828615693684125</guid><pubDate>Thu, 09 May 2013 12:47:00 +0000</pubDate><atom:updated>2013-05-09T14:47:23.140+02:00</atom:updated><title>If you know nothing else about Information Security... know this!</title><atom:summary type="text">[The best advice you can get (today anyhow)]

Information Security, like any other profession or specialisation has a lot of technical confusing terms and jargon. It has tools that only experts can use and statistics that only the same experts can read. It creates a brotherhood (and sisterhood) of professionals and this is fine.

But, also like other professions, Information Security has its </atom:summary><link>http://securethink.blogspot.com/2013/05/if-you-know-nothing-else-about.html</link><author>noreply@blogger.com (Allen Baranov)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKWkbjnxQeSiaF_X0W_fta9E5jrlWg-QJ2oPYSKItM_7GRizy9T-zXOPFetgakBli7seajvH7cva3ziCguM-F9dG3df234n9krTO1E8JPgWwG0SkQzvxVx3OBtZxbFDYC7zbYXJW0n2to/s72-c/Websense_Java_versions.png" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-750537400657059394</guid><pubDate>Fri, 05 Oct 2012 13:33:00 +0000</pubDate><atom:updated>2012-10-05T15:33:23.955+02:00</atom:updated><title>What if - trams actually turned into rhinos?</title><atom:summary type="text">Anyone who has spent enough time in Melbourne would have caught a tram and would have probably seen this poster:




It is a warning on the how dangerous it could be to be hit by a tram published in the interests of passenger safety by Yarra Trams.

My brain did a bit of a wobble and came up with this question:

"What would happen if magically each of the trams in Melbourne were to turn into 30 </atom:summary><link>http://securethink.blogspot.com/2012/10/what-if-trams-actually-turned-into.html</link><author>noreply@blogger.com (Allen Baranov)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsm6WhMUOGLdI7Z_YCUnXT_xAbf2J4LELRQ4RGaCQH2Wjl0bIC2En3YSxgkVV2a1scAZ8KhlpHz890fnc-_GWcWPKWpFpfvktKytd89A1Q6RU-dwT2E4pCXD-Y3CujcZ2ZxKdZzGkY1ew/s72-c/rhinoposter.jpg" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-844739622891662225</guid><pubDate>Mon, 01 Oct 2012 07:42:00 +0000</pubDate><atom:updated>2012-10-01T09:42:40.921+02:00</atom:updated><title>IT vs Business (The War We Don't Even Know We Are Fighting!)</title><atom:summary type="text">[IT is out to kill the business - Business is out to kill IT. We all win!]

My dad has essentially worked for 2 companies in his 50 or so years in business and had he not emigrated, he probably would have stayed at one. I worked at 2 companies in just my first 5 years of full time employ. And this is not strange. No one viewed me as unstable or a "job hunter". It is just the way it works.

"</atom:summary><link>http://securethink.blogspot.com/2012/10/it-vs-business-war-we-dont-even-know-we.html</link><author>noreply@blogger.com (Allen Baranov)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-8090829642409377044</guid><pubDate>Fri, 14 Sep 2012 05:21:00 +0000</pubDate><atom:updated>2012-09-14T07:21:22.612+02:00</atom:updated><title>HD Moore's Law? How can you tell if you are compliant?</title><atom:summary type="text">HD Moore's Law is a joke. And not a very funny one either being a pun and having a requirement of being very technical and requiring knowledge of the IT Security community just to get half way to understanding it. It usually requires the user of the term to explain why it is funny and that is a serious faux pas when it comes to jokes.

So, let me explain the joke. :)

Moore's Law is pretty well </atom:summary><link>http://securethink.blogspot.com/2012/09/hd-moores-law-how-can-you-tell-if-you.html</link><author>noreply@blogger.com (Allen Baranov)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-4787109661540297856</guid><pubDate>Tue, 04 Sep 2012 01:13:00 +0000</pubDate><atom:updated>2012-09-04T03:13:59.463+02:00</atom:updated><title>Seven Habits of Highly Effective Security Plans [Part 6]</title><atom:summary type="text">

Habit 4 is the first habit to deal with “others”. The first
3 habits are internal – 4 is external. 

Think “Win-win”. This is almost impossible for a security
professional. Almost.



The issue is that every
change to a system (from a lonely PC to a worldwide network) has some risk to
the system itself and mostly in terms of availability. In some cases the risk
is 100% - for example when a </atom:summary><link>http://securethink.blogspot.com/2012/09/seven-habits-of-highly-effective_4.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-506564315532530198</guid><pubDate>Tue, 04 Sep 2012 01:10:00 +0000</pubDate><atom:updated>2012-09-04T03:10:39.367+02:00</atom:updated><title>Seven Habits of Highly Effective Security Plans [Part 5]</title><atom:summary type="text">Steven R Covey died on July 16, 2012. This is sad news indeed. I really liked his 7 habits work. It was (like ISO27002 and the like) a good framework but not a good standard. And therein lies its power. It is like powered milk – without adding something then you have nothing. I took the 7 habits and started (5 years ago!) to make a series called the 7 habits of highly effective security policies.</atom:summary><link>http://securethink.blogspot.com/2012/09/seven-habits-of-highly-effective.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-4082557190544392823</guid><pubDate>Tue, 24 Apr 2012 09:55:00 +0000</pubDate><atom:updated>2012-04-24T11:55:18.513+02:00</atom:updated><title>Why the Privacy Bill is important to you!</title><atom:summary type="text">
[Almost every country in the world protects its citizens' person information. Almost.]









This is an example of a Membership Application form that I needed to fill in to be able to rent a video. You'll notice that besides all the usual stuff, they have asked for my date of birth, ID number, employer. They need to know my next of kin which is interesting.. in case I die while hiring a video</atom:summary><link>http://securethink.blogspot.com/2012/04/why-privacy-bill-is-important-to-you.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwRTSlN5ujcdnK1TVnsHbGClLU0LzOfqu0fa5rlewVaZics7yFio1K-mOifR3WhmaDJsHwlJhB4KQpfxrc2FeFHGR6ceVUJnwQaT954DYrdSbT6DhI5lNJ-CJFCPmjlQu8vi6gp0FSNBUS/s72-c/VideoApp.png" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-7265162814048303127</guid><pubDate>Fri, 09 Mar 2012 10:31:00 +0000</pubDate><atom:updated>2012-03-09T12:31:27.925+02:00</atom:updated><title>The Meaning of Life Part 1 - The Firewall</title><atom:summary type="text">[Your Firewall does nothing...yet]

This is the third time I am writing this blog post because I just couldn't seem to get the thought straight and the tone and level right. My first two attempts took a whole bunch of text to say this:

Basically Firewalls came before NAT. NAT is a magic network concept that creates a type of one-way-mirror allowing devices on the inside of the firewall to </atom:summary><link>http://securethink.blogspot.com/2012/03/meaning-of-life-part-1-firewall.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-3320309497308051358</guid><pubDate>Fri, 09 Mar 2012 08:22:00 +0000</pubDate><atom:updated>2012-03-09T10:22:52.962+02:00</atom:updated><title>Information Security Analyst Available.</title><atom:summary type="text">[Hire Me... Please.]

I am currently searching for a job so if any of my&amp;nbsp;dedicated&amp;nbsp;readers know of anything...please let me know.

I have about 10 years of experience in Information Security and am currently an Information Security Analyst for The South African Breweries Ltd. I have built up a wealth of technical knowledge but my most recent experience is in management which means </atom:summary><link>http://securethink.blogspot.com/2012/03/information-security-analyst-available.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-408212353736222988</guid><pubDate>Tue, 22 Nov 2011 13:55:00 +0000</pubDate><atom:updated>2011-11-23T09:59:46.059+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">cool technology</category><category domain="http://www.blogger.com/atom/ns#">google</category><category domain="http://www.blogger.com/atom/ns#">kitt</category><category domain="http://www.blogger.com/atom/ns#">knight rider</category><category domain="http://www.blogger.com/atom/ns#">off topic</category><category domain="http://www.blogger.com/atom/ns#">the hoff</category><title>Google's Next Big Thing</title><atom:summary type="text">
[A company owned by geeks - its obvious what is next: KITT]



I think, after spending quite a while putting all the information I have together and filling in the blanks what Google's next big aim is.



So, from what I can tell the original founding members of Google - Larry Page and Sergey Brin put this list together as things to do with their lives:




Create cool geeky technology&amp;nbsp;


</atom:summary><link>http://securethink.blogspot.com/2011/11/googles-next-big-thing.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-517234756073407591</guid><pubDate>Mon, 24 Oct 2011 13:40:00 +0000</pubDate><atom:updated>2011-10-24T15:40:14.666+02:00</atom:updated><title>A great loss to the IT world. One of its great inventors dies.</title><atom:summary type="text">
[Dennis Ritchie died at the age of 70.]

He was one of the most influential computer engineers ever. I could go into details as to what he did but lets look only at how his work contributed to Steve Jobs becoming a household name.

Ritchie created the C programming language and with Ken Thompson, Ritchie created the Unix Operating System.

With out Unix, Jobs would not have had a basis for his </atom:summary><link>http://securethink.blogspot.com/2011/10/great-loss-to-it-world-one-of-its-great.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-3579404927765059345</guid><pubDate>Wed, 27 Jul 2011 07:55:00 +0000</pubDate><atom:updated>2011-07-27T09:55:52.788+02:00</atom:updated><title>What are your rights regarding personal email? [Extra Bit]</title><atom:summary type="text">[Are Facebook Saints?]

Just adding an extra point to my recent Blog post.

The question I posed in my last post about email sharing&amp;nbsp;was triggered by Facebook stating that it is wrong for a person to mass move private details such as email addresses and telephone number etc to a new service provider without the person knowing. It is an interesting (and perhaps valid) argument which covers up</atom:summary><link>http://securethink.blogspot.com/2011/07/what-are-your-rights-regarding-personal_27.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-5769326140986306947</guid><pubDate>Thu, 07 Jul 2011 13:41:00 +0000</pubDate><atom:updated>2011-07-07T15:41:19.720+02:00</atom:updated><title>What are your rights regarding personal email?</title><atom:summary type="text">[I'm not talking legally...just ethically]

So, someone gives you their business card with all their details. Can you load it on Outlook to make it easier for you to contact them. Can you add them to you phonebook on your phone? What if your phone gets stolen? Can you give it to a colleague? What if the colleague has some work for the person? What if the colleague is an annoying git? Can you give</atom:summary><link>http://securethink.blogspot.com/2011/07/what-are-your-rights-regarding-personal.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-6770331119497810410</guid><pubDate>Fri, 20 May 2011 10:56:00 +0000</pubDate><atom:updated>2011-05-20T12:56:34.033+02:00</atom:updated><title>ITWeb Security Summit - Wrap Up [Part One]</title><atom:summary type="text">[Some good stuff from the conference]

I really wanted to write something longer but this will do for now. I just want to get something out there that is not a tag-cloud.

Stuxnet and Spy Wars
Patrick Gray from Risky Business Podcast and Tony Olivier both spoke about a world that we are only starting to understand now where Governments are playing with Information and changing the world with </atom:summary><link>http://securethink.blogspot.com/2011/05/itweb-security-summit-wrap-up-part-one.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-4840938749088976802</guid><pubDate>Mon, 16 May 2011 08:48:00 +0000</pubDate><atom:updated>2011-05-16T10:48:49.971+02:00</atom:updated><title>ITWebSec Tag Cloud part 2</title><atom:summary type="text">This is an updated to the previous post. I have cleaned up the data a bit. Again I left out the words "HTTP", "ITWebSec" and "RT" as these added nothing to the cloud and common English words such as "The" and "And". Including these words, there are 2307 different words. The top names (chosen by "@" in front) are: @itwebsec, @haroonmeer, @MushiD, @mattdoterasmus, @abaranov and @DeepPurple77.

The </atom:summary><link>http://securethink.blogspot.com/2011/05/itwebsec-tag-cloud-part-2.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6-ZqMpKpePU7_0Oh3KwhgPD4CZQ06JuKi76SPOd_cKANpT9VKn4HDFG55rwaKorY6SGyRjiUXbBP6f1vSfdB1PMc3kgSy7DhMe7FGa32ZqeAmnn9N47UkSUmiRAYYVXIGqGZGB0VMXYah/s72-c/itweb-cloud.gif" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-3139882408065878394</guid><pubDate>Wed, 11 May 2011 01:42:00 +0000</pubDate><atom:updated>2011-05-11T03:42:47.326+02:00</atom:updated><title>ITWebSec tag cloud</title><atom:summary type="text">There was too much information at ITWeb Security Summit for me to make a sensible post of all of it just yet.

So, I thought I would hack something together. I ran a search against the latest 100 twitter comments:&amp;nbsp;http://search.twitter.com/search.atom?q=%23itwebsec&amp;amp;rpp=100&amp;nbsp;,got the feed as XML. Grepped for "title", popped that into tagcrowd.com&amp;nbsp;, fiddled the results a bit and:

</atom:summary><link>http://securethink.blogspot.com/2011/05/itwebsec-tag-cloud.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBfIAykxLce2aEIA5SVApegPlUZc2kYZFDkxUbmPexI8NmeuLR6roO6wvYbEonP_U4uiMMAGPXNN6RN9ZFwqYdgHgbcMwF61HyHUWGhLo5UkD6P8sKQKfECUh1dea-JTpZ-iJsOv7rXssY/s72-c/itwebsec1.png" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-7077497582549389501</guid><pubDate>Thu, 05 May 2011 09:43:00 +0000</pubDate><atom:updated>2011-05-05T11:43:27.721+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">ITweb11</category><category domain="http://www.blogger.com/atom/ns#">presentation</category><title>Miscellaneous Ramblings - Irony, Security Summit etc</title><atom:summary type="text">I've been doing a lot of thinking recently about the last year. I basically run my professional year from ITWeb Summit to ITWeb Summit and around this time I think back over the last year about what has changed and what is new.

I find that InfoSec is cyclical and this year is the unexciting one. Last year we were dealing with iPads and their ilk and Cloud and SaaS and all that good stuff was </atom:summary><link>http://securethink.blogspot.com/2011/05/miscellaneous-ramblings-irony-security.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-3618697610146516258</guid><pubDate>Fri, 01 Apr 2011 11:21:00 +0000</pubDate><atom:updated>2011-04-01T13:21:29.519+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computers</category><category domain="http://www.blogger.com/atom/ns#">dlp</category><category domain="http://www.blogger.com/atom/ns#">humans</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">passwords</category><title>I cheated....</title><atom:summary type="text">[... at Sudoku]

When I first started with Sudoku puzzles my interest was "how do I reduce these to an&amp;nbsp;algorithm?" I wrote some code that would solve the puzzles and then started to try do it in my head.

I got better and better and the simpler puzzles started to get very boring and the harder ones became easy. Then, recently I got hold of an advanced Sudoku book and I was hooked once again.</atom:summary><link>http://securethink.blogspot.com/2011/04/i-cheated.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-6140766925852534985</guid><pubDate>Tue, 08 Mar 2011 08:46:00 +0000</pubDate><atom:updated>2011-03-08T10:46:07.188+02:00</atom:updated><title>[Slightly OT] Whats Your Number, Cucumber?</title><atom:summary type="text">I was doing some "research" (Google search for "Allen Baranov") and found a little nugget back from 2001 when I asked how long until phone numbers become redundant. 

I think I was a bit ahead of my time - we are still waiting for a DNS for telephone numbers after all.

But seriously, how many telephone numbers did you used to know? And how many do you know now? From someone with a short-term </atom:summary><link>http://securethink.blogspot.com/2011/03/slightly-ot-whats-your-number-cucumber.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9126889845924473010.post-864429951282208042</guid><pubDate>Fri, 04 Feb 2011 07:53:00 +0000</pubDate><atom:updated>2011-02-04T09:53:32.142+02:00</atom:updated><title>The Hoff Asks Some Tough Questions</title><atom:summary type="text">[Must Read Article To Get You Thinking]

I usually don't repost blogs and articles that I find because I like this blog to my personal sounding post. The practice can also lead to a blogger feeling that he is&amp;nbsp;accomplishing&amp;nbsp;something but is really just posting links over and over. I have an RSS reader to do that for me, a Google to get the stuff I missed.

However, I was drafting an </atom:summary><link>http://securethink.blogspot.com/2011/02/hoff-asks-some-tough-questions.html</link><author>noreply@blogger.com (Anonymous)</author></item></channel></rss>