<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-9060302730450902062</id><updated>2024-08-28T05:44:25.494-04:00</updated><category term="IA"/><category term="Information Security"/><category term="CIPP"/><category term="Encryption"/><category term="LinkedIn"/><category term="Security Incident Management"/><category term="Social Networking"/><category term="Acquisitions"/><category term="Authentication"/><category term="BD"/><category term="Barbra Symonds."/><category term="Business Development"/><category term="CISSP"/><category term="Certified Information Privacy Professional"/><category term="Certified Information Systems Security Professional"/><category term="Development"/><category term="Hacking"/><category term="IAPP"/><category term="InfoSec"/><category term="Information Assurance"/><category term="Ironport"/><category term="M and A"/><category term="Mergers"/><category term="Microsoft silent update"/><category term="Postini"/><category term="Privacy Professional"/><category term="R and D"/><category term="Research"/><category term="SIM"/><category term="Secure Computing"/><category term="Trust"/><category term="Virtual Machine"/><category term="Windows Update"/><category term="email gateway"/><category term="encrypted email"/><category term="mail gateway security"/><category term="xB"/><title type='text'>Secu RE marks</title><subtitle type='html'>Information Security issues and commentary</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>10</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-3542272794957705396</id><published>2008-04-25T16:54:00.002-04:00</published><updated>2008-04-25T16:59:14.703-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Barbra Symonds."/><category scheme="http://www.blogger.com/atom/ns#" term="Certified Information Privacy Professional"/><category scheme="http://www.blogger.com/atom/ns#" term="Certified Information Systems Security Professional"/><category scheme="http://www.blogger.com/atom/ns#" term="CIPP"/><category scheme="http://www.blogger.com/atom/ns#" term="CISSP"/><title type='text'>Upcoming interview w/ Barbra Symonds</title><content type='html'>An interview with the Barbra Symonds, Associate Partner with IBM, and former IRS Director of Privacy &amp;amp; Information Protection, and before that project manager for the Veteran&#39;s Administration&#39;s Privacy policy will appear on the &lt;a href=&quot;http://blog.cippguide.org&quot;&gt;cippguide.org&lt;/a&gt; site within the next 7 - 10 days, pending approval.  It was a great interview, with some timely comments on the state of information security and information privacy.</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/3542272794957705396/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/3542272794957705396?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/3542272794957705396'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/3542272794957705396'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2008/04/upcoming-interview-w-barbra-symonds.html' title='Upcoming interview w/ Barbra Symonds'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-8731220072114514644</id><published>2008-03-26T09:38:00.013-04:00</published><updated>2008-03-26T11:09:01.568-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="email gateway"/><category scheme="http://www.blogger.com/atom/ns#" term="encrypted email"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="IA"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Ironport"/><category scheme="http://www.blogger.com/atom/ns#" term="mail gateway security"/><category scheme="http://www.blogger.com/atom/ns#" term="Postini"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Incident Management"/><title type='text'>Secure Messaging Gateway:  An Ironport Review</title><content type='html'>Over the weekend, I did a lot of reading on a company in the mail gateway business called Ironport.   I mean a &lt;font style=&quot;font-style: italic;&quot;&gt;lot&lt;/font&gt; of reading.   This was another consolidation (see &lt;a href=&quot;http://www.ecademy.com/node.php?id=68989&quot;&gt;Why behemoths buy startups&lt;/a&gt; &amp;amp; March 08&#39;s Information Security Magazine&#39;s &lt;a href=&quot;http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1303850,00.html&quot;&gt;Schneier/Ranum Face Off&lt;/a&gt;), with Cisco snatching up the market leader.&lt;br /&gt;&lt;br /&gt;I read about capabilities, product offerings, market penetrations, strategic positioning, competitors and magic quadrants.  All of this was at the urging of a friend of mine at Cisco, and how this product would drive profits for the company for the next several quarters.&lt;br /&gt;&lt;br /&gt;I did a similar exercise for my boss with respect to Postini, and their SOA mail security capabilities purchased by Google in 2006 (More on Postini in a future post).  I expect his interest is due to the encrypted email gateway.&lt;br /&gt;&lt;br /&gt;So what did I learn.  First, both of these guys lay claim to reputation based filtering.  One holds the patent (Postini, more on this in a later post) and one has it widely implemented, maybe even longer than the patent was applied for (if so, of course that would invalidate the patents).&lt;br /&gt;&lt;br /&gt;Gartner thinks Postini would only use those patents defensively.  I wonder what would happen if a new Executive management team came in at the search giant...  Cisco has deep pockets, but Google&#39;s &quot;do no evil&quot; mantra should keep this out of litigation.  Why?  Because Ironport gateways are installed worldwide, and their reputation filters handle 5 Billion email messages.  Per day!  They calculate that&#39;s over 40% of the mail traffic worldwide.  From that traffic analysis, they push threat updates in near real time (every 5 mins).&lt;br /&gt;&lt;br /&gt;I&#39;d say that is doing no evil.   John Chambers likes monopolies.  Ish (for the Justice Department and the Sherman Anti-trust Act).  Cisco has 80% of the router and switch market.  A lot of companies say &#39;Does it have a Cisco tag on it?  Yes?  Then it can come into my network...&#39;&lt;br /&gt;&lt;br /&gt;In addition to the reputation filters, Ironport has several other unique features.  They built their gateways on a modified FreeBSD OS they call AsycOS.   AsycOS&#39; security includes a limited port attack surface, reputation based filtering at the connection level, an LDAP/Active Directory integration that drops mail for invalid addresses without the Exchange &amp;amp; Notes wasting their CPU cycles and disk space.  Performance enhancements include a non-blocking I/O write cache (disk access IO is their major bottleneck), and intelligent mail transfers (check to see if a domain is up before sending), and per receiving domain message queuing.  Lastly are the management features, including an intuitive, web based GUI (it really is pretty simple), a three tiered rule set deployment, and a peer-to-peer control structure.  For disconnected users, there&#39;s also an email gateway.  And of course, they have tons of case studies from recognizable names like Dell, Virgin, Ryder, Johns Hopkins, etc...&lt;br /&gt;&lt;br /&gt;I expect Cisco will increase Ironport&#39;s distribution throughout the messaging space.  Now we just need Microsoft to buy Tumbleweed (the other upper right magic quadrant product) and the big mergers and acquisitions will be complete.</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/8731220072114514644/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/8731220072114514644?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/8731220072114514644'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/8731220072114514644'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2008/03/secure-messaging-gateway-ironport.html' title='Secure Messaging Gateway:  An Ironport Review'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-1318124309485697380</id><published>2008-03-18T13:15:00.006-04:00</published><updated>2008-03-18T13:38:37.961-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CIPP"/><category scheme="http://www.blogger.com/atom/ns#" term="IA"/><category scheme="http://www.blogger.com/atom/ns#" term="IAPP"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Assurance"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="InfoSec"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy Professional"/><title type='text'>Certified Information Privacy Professional</title><content type='html'>Privacy and Information Security have always gone hand and hand.  When discussing the three tenets of InfoSec &lt;a href=&quot;http://en.wikipedia.org/wiki/Information_security&quot;&gt;(Integrity, Availability, and Confidentiality)&lt;/a&gt;, confidentiality typically envelops privacy.  In the networking/computer world, this privacy normally references encryption or separation (duties, networks, equipment, etc).   I deal with these aspects on a daily basis, and the knowledge base for these topics and &lt;a href=&quot;http://www.isc2.org&quot;&gt;individuals practicing&lt;/a&gt; them is quite large (CISSP). However, as I&#39;m quickly finding, there are unexpected elements of Privacy (compliance/regulatory, for example) where I am quite ignorant.&lt;br /&gt;&lt;br /&gt;Over the next few weeks, I&#39;m preparing for the &lt;a href=&quot;https://www.privacyassociation.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=36&amp;amp;Itemid=223&quot;&gt;Certified Information Privacy Professional&lt;/a&gt; examination offered through the &lt;a href=&quot;http://www.privacyassocation.org/&quot;&gt;International Association of Privacy Professionals&lt;/a&gt;.  Hopefully, there will be a few details on my new &lt;a href=&quot;http://infoprivacy.blogspot.com/&quot;&gt;Information Privacy blog&lt;/a&gt; that may be helpful to the community at large.</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/1318124309485697380/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/1318124309485697380?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/1318124309485697380'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/1318124309485697380'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2008/03/certified-information-privacy.html' title='Certified Information Privacy Professional'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-8513141713038580497</id><published>2007-10-08T14:13:00.000-04:00</published><updated>2007-10-09T12:13:59.686-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IA"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="LinkedIn"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Networking"/><title type='text'>Are you at risk? Bogus Entries on Networking Sites &amp; it&#39;s impact on personal branding</title><content type='html'>&lt;small&gt;Original Post on 12-Jun-06 9:24pm&lt;br /&gt;&lt;/small&gt;                     The Information Assurance (IA) industry is quite small; the same major players are known throughout everyone&#39;s circles. Gene Spafford is the GodFather. His legendary research into the security arena influenced most (read all) computer science/engineering students since before my time, and his contributions through Purdue&#39;s &lt;a href=&quot;http://www.cerias.purdue.edu/&quot;&gt;CERIAS department&lt;/a&gt; still push IA research.  Martin Roesch designed the &lt;a href=&quot;http://www.snort.org/&quot;&gt;Snort Intrusion Detection System&lt;/a&gt;, considered by most as the only open source IDS deployable in a true operational environment. And Stephen Northcutt, the Director of the &lt;a href=&quot;http://www.sans.org/&quot;&gt;SANS Institute&lt;/a&gt; and originator of the SHADOW IDS from the Dahlgren Naval Surface Warfare Center, advertised by many as the first Network IDS. All of these men are well connected, and their reputations don&#39;t do their contributions justice.&lt;br /&gt;&lt;br /&gt;So recently, in the midst of finishing my graduate studies and a shakeup within my current company, I thought it might be a good idea to clean up my resume. I&#39;ve written a few papers, passed a couple of certifications, and spent time with a few companies. When I do a vanity search, I come up with a half dozen hits. Not bad, but those hits don&#39;t cover most of my work. In the wake of my recent schooling on the importance of marketing, I decided I should begin building my personal &quot;brand&quot;. That&#39;s about the time I received an invitation to join &quot;Linked-In&quot; from a former colleague, and I started examining the networking sites. What a way to rediscover my contacts! Linked-In claims 6 Million users. The US has a population of roughly 240 M. And think who actually joins these networking sites: Information Technology or other well heeled white collar workers. I went through my stack of business cards, and found 100 or so people I&#39;d met, be them vendors, University contacts, or colleagues. Each person that joined added a couple more names I recognized, and everything kept growing.&lt;br /&gt;&lt;br /&gt;Now for the funny part. Remember about the size of the IA industry. The major players were already on the site. I sent them invitations, and received word back from most of them. Until Northcutt. I found him on the site, and posted the invite, expecting a quick note back saying hello. Instead Stephen Northcutt writes: &quot;For real, I am not a member of LinkedIn, that is weird.&quot;&lt;br /&gt;&lt;br /&gt;I sent him a copy of &quot;his&quot; profile, to which I received: &quot;That is awesome, and that was my job title back in 2004. Anyway, I promise I am not a linked inner&quot;. I started thinking about what could actually happen with irresponsible/malicious use of these sites. What could branding theft hurt? I could see networking impersonation benefits, people sending invites based on your status/reputation... They put together a huge email list of the best/brightest of your contacts, those that are the most &quot;linked-in&quot;. What happens when they ask for introductions, based on your title and prestige, to other top connections. Think about &quot;you&quot; asking Spaf or Marty for introductions to their 600 or 1000+ contacts. Or better still, a VC evaluator, someone like Becky Bace, another IA heavy weight. Your contacts happily oblige the introductions. It&#39;s no longer a cold call for the imposter.&lt;br /&gt;&lt;br /&gt;The reason I bring this up is simple. These are security experts. Stephen has a list of accomplishments that most people dream of for an industry reputation. I mean, he started an Information Security training institute. How would he ever know he&#39;d been duped? And how would it be corrected? If the security experts miss this, what about you?</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/8513141713038580497/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/8513141713038580497?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/8513141713038580497'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/8513141713038580497'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2007/10/are-you-at-risk-bogus-entries-on.html' title='Are you at risk? Bogus Entries on Networking Sites &amp; it&#39;s impact on personal branding'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-3902277053666712404</id><published>2007-10-08T14:12:00.000-04:00</published><updated>2007-10-09T12:17:10.828-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="IA"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="LinkedIn"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Networking"/><title type='text'>Hacking &quot;Linked-In&quot;: Working around the social part of social networking</title><content type='html'>&lt;small&gt;Original Post on 14-Jun-06 4:50pm &lt;/small&gt;&lt;br /&gt;                  I use &quot;Linked-In&quot; for a social networking, and online contact management tool. It&#39;s quite convenient, nearly a true peer-to-peer instantiation of a friend of a friend tool (at least in the free version) and pretty indicative of most of these sites. In order to connect with someone, you either must have their email address and send them an invitation, or ask someone you&#39;re already connected with for an introduction, all brokered by Linked-In. I say nearly a true peer-to-peer social networking tool, as there are a couple of ways to bypass their system. Take a look at the following &quot;Linked-In&quot; profile:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;b&gt;Computer &amp;amp; Network Security Professional&lt;/b&gt;&lt;br /&gt;Greater Los Angeles Area | Computer &amp;amp; Network Security&lt;br /&gt;&lt;b&gt;Experience:&lt;/b&gt;&lt;br /&gt;Sales&lt;br /&gt;&lt;u&gt;Northrop Grumman &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1985 - Present (21 years)&lt;br /&gt;Business Development Manager&lt;br /&gt;&lt;u&gt;Lockheed &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1995 - 2006 (11 years)&lt;br /&gt;Business Development Manager&lt;br /&gt;&lt;u&gt;Boeing &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1995 - 2006 (11 years)&lt;br /&gt;Business Development Manager&lt;br /&gt;&lt;u&gt;Northrop &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1985 - 2006 (21 years)&lt;br /&gt;Business Development Manager&lt;br /&gt;&lt;u&gt;Blue Lance &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1995 - 2006 (11 years)&lt;br /&gt;Sales&lt;br /&gt;&lt;u&gt;Decision One &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1995 - 2005 (10 years)&lt;br /&gt;Business Development Manager&lt;br /&gt;&lt;u&gt;Pacific Bell &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1995 - 2005 (10 years)&lt;br /&gt;Business Development Manager&lt;br /&gt;&lt;u&gt;DecisionOne &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1995 - 2005 (10 years)&lt;br /&gt;Business Development Manager&lt;br /&gt;&lt;u&gt;SBC &lt;/u&gt;&lt;br /&gt;&lt;i&gt;Computer &amp;amp; Network Security Industry&lt;/i&gt;&lt;br /&gt;1995 - 2005 (10 years)&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;I received this yesterday as a &quot;Colleague&quot; connect request. If your years at a specific company or school overlap with someone else, a feature within the site allows a bypass mechanism. Your message is automatically sent without any outside broker (introducer/friend) or previous knowledge (an email address). It appears that this gentleman was a very rich, and very busy boy. In fact, since 1985, he &quot;worked&quot; at 7 major companies simultaneously. The only people I know afforded that sort of leeway are consultants, and they aren&#39;t business development managers (the SEC frowns on this, something about overlapping strategies and oligopolies). All of his employers are in the Computer &amp;amp; Network Security Industry, and security&#39;s a hot market, so my guess is, he&#39;s a head hunter, or maybe a mass marketer selling niche email lists. Or maybe, he&#39;s a corporate spy. Probably not, but that&#39;s the security guy in me.&lt;br /&gt;&lt;br /&gt;I bring this up for user education. I personally found several University classmates I hadn&#39;t talked to in over 10 years through this same feature. And there is a temptation for networking with this guy; it appears over 177 people accepted his invitation. The only question really is how many of them he actually knows. Thankfully, you still have to choose to link with your contacts. Linked-In gives you the option of reporting the user for agreement violation. Just think before you click. If it doesn&#39;t look right, it probably isn&#39;t. What&#39;s a social network if there&#39;s no value in who you&#39;re connected with?</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/3902277053666712404/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/3902277053666712404?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/3902277053666712404'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/3902277053666712404'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2007/10/hacking-linked-in-working-around-social.html' title='Hacking &quot;Linked-In&quot;: Working around the social part of social networking'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-187272102697735501</id><published>2007-10-08T14:11:00.001-04:00</published><updated>2007-10-09T12:36:23.739-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Acquisitions"/><category scheme="http://www.blogger.com/atom/ns#" term="BD"/><category scheme="http://www.blogger.com/atom/ns#" term="Business Development"/><category scheme="http://www.blogger.com/atom/ns#" term="Development"/><category scheme="http://www.blogger.com/atom/ns#" term="M and A"/><category scheme="http://www.blogger.com/atom/ns#" term="Mergers"/><category scheme="http://www.blogger.com/atom/ns#" term="R and D"/><category scheme="http://www.blogger.com/atom/ns#" term="Research"/><title type='text'>Why the Behemoths Buy Startups - The Business of Research &amp; Development and Fortune 500&#39;s</title><content type='html'>&lt;small&gt;Original Post on 16-Jun-06 3:47pm &lt;/small&gt;                &lt;br /&gt;The booming 90&#39;s and the tech bubble produced some of the fastest paths to riches, especially for entrepreneurs. Startups with good ideas were quickly snapped up, without even a completed product. Thankfully, that exuberance burst, and the idea must at least be fleshed out. This system nearly makes corporate R&amp;amp;D budgets redundant and cost ineffective.&lt;br /&gt;&lt;br /&gt;First, a bit of history: in the olden days, companies handled research and development in house. Costs for a mainframe computer were more than all but the largest organizations could afford. Think of Xerox PARC. The company developed everything, from the copier to the mouse, most dependent on computers. Most other companies couldn&#39;t afford the R&amp;amp;D costs/staff for such a lab, and it was just too much of a risk exposing the fruits of lab&#39;s labor, the intellectual property, to any external companies. The case law building the legal aspects of technology transfer were in place, but not as well defined as today. Later, University sponsorships gained popularity for their pure research aspects, where the technology was not normally developed into anything tangible, and instead transferred into the in-house labs. As time wore on, companies sponsored research with other companies, sharing the huge expenses, risks, and splitting the final rewards.&lt;br /&gt;&lt;br /&gt;Compare this work to the more recent PC era. Anyone could do basic research or software creation with their own IBM clone and a little programming knowledge; the costs of entry were extraordinarily reduced. Smaller companies like Microsoft, and later Cisco in Networking, could compete in a fledgling industry with a first to market or lowest cost marketing advantage. These tiny companies make changes in response to new opportunities and define new strategies faster than their process oriented, large-scale opponents. Also with the PC and computer age came a slew of technology case law and boundary pushing patent applications. By the 90&#39;s, business process patents began covering the hyperlink, one click purchase, and wireless email. Several of these came out of smaller, less well funded companies.&lt;br /&gt;&lt;br /&gt;Fortune 500 corporations&#39; R&amp;amp;D couldn&#39;t keep up. They became less integral to the company&#39;s bottom line. The R&amp;amp;D expenses associated with the larger companies became a drag on the company&#39;s profits and thereby susceptible to outsourcing. The new technologies necessary for a company&#39;s business were protected by the more lenient laws, and licensed by the smaller developer to multiple big companies. This eliminated any competitive advantage for all of the licensees. So, most big companies spun off their R&amp;amp;D departments, creating autonomy and more nimble, competitive organizations, or essentially, well funded startups.&lt;br /&gt;&lt;br /&gt;Today, to replace the lost product enhancements and cutting edge capabilities created in-house, Fortune 500&#39;s began buying the smaller companies with market changing intellectual property or patents. By incorporating those products into the larger corporate vault, they also took away any competitor market balancing licensing or product copying techniques. This trend continues today, virtually eliminating the in-house Research &amp;amp; Development departments, and instead, allowing upstarts with great ideas the profits.</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/187272102697735501/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/187272102697735501?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/187272102697735501'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/187272102697735501'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2007/10/why-behemoths-buy-startups-business-of.html' title='Why the Behemoths Buy Startups - The Business of Research &amp; Development and Fortune 500&#39;s'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-4203675457904776998</id><published>2007-10-08T14:09:00.000-04:00</published><updated>2007-10-09T12:36:36.276-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Authentication"/><category scheme="http://www.blogger.com/atom/ns#" term="Trust"/><title type='text'>Who do you trust? Why would you trust THEM? - Authentication mechanisms and their computer analogs</title><content type='html'>&lt;small&gt;Original Post on 19-Jun-06 2:42pm&lt;br /&gt;&lt;/small&gt;                              The issue of trust is a big deal.  The only time &lt;i&gt;anything&lt;/i&gt; is for sure about you is directly out of the womb. Think about it. Doctors make mistakes and switch babies (The Omen). Adopted infants may not be told anything about their birth parents until age 18. DNA tests and lab mistakes incorrectly label genetic deficiencies. Identity theft (Catch me if you can). The list goes on. So what happens? You notice genetically dominant/recessive traits. You get a second opinion or follow-up test. You check your credit. You have multiple people vouch for you.&lt;br /&gt;&lt;br /&gt;So how well does this work in the computer realm? Information security experts typically suggest digital certificates, a kind of &quot;drivers license&quot; if you will. Think about when you go to your bank&#39;s website. Ever notice the https in the address line or the small lock in the bottom corner of your web browser. Those are both signals of digital certificates. If you&#39;re ever curious or bored one day, actually double click the lock icon, and you can see who you are trusting. It may surprise you in some instances that the only computer &quot;trusted&quot; is itself. This is the equivalent of me coming up to you at a networking event, and handing you my business card. I could print whatever I want on it, and you would probably believe it. In the computer realm, this is why phishing works.&lt;br /&gt;&lt;br /&gt;If you were really interested in doing business with me, you might try to verify my card, by calling my company, and for more verification, my HR department. Or better still, do a Dunn &amp;amp; Bradstreet or SEC filing search for my company&#39;s credibility. All of these have equivalents in the digital world. After you double clicked the lock icon, you may see the company&#39;s name, or an Internet Service Provider. If it&#39;s a really big bank, you&#39;ll see higher and higher levels of assurance, from companies like &lt;a href=&quot;http://www.verisign.com/&quot;&gt;Verisign&lt;/a&gt; or &lt;a href=&quot;http://www.thawte.com/&quot;&gt;Thawte&lt;/a&gt;, that the computer is who they say they are. All of these may be forged or manipulated. They are only akin to a driver&#39;s license. Your bank brought in a birth certificate and social security card, but nothing more.&lt;br /&gt;&lt;br /&gt;More recently, banks began putting a second &quot;factor&quot; of authentication on their sites. Bank of America uses a picture you select from thousands of choices. If, after they verify their side with the aforementioned certificate, you see a picture other than the one you chose, there is a trust issue. You shouldn&#39;t continue with the bank transfer of large sums of money between &quot;your&quot; accounts.&lt;br /&gt;&lt;br /&gt;So how do you generate trust? References or referrals seem prudent. If you start with people you already trust, it&#39;s even better. And you trust those people because they haven&#39;t given you any reason not to. That&#39;s why the undercover spies are so effective. They&#39;re in place for 5 or 10 years before they receive &lt;i&gt;the&lt;/i&gt; call. This is also why informants/traitors work so well. As an insider threat, they already have access to whatever information&#39;s deemed valuable, and were finally given an offer they couldn&#39;t refuse. You&#39;ve seen how to avoid this in the cold war movies. Two people have two keys with keyholes on opposite sides of the room. The keys must turn at the same time to launch the nukes, or shut down the reactor core, or whatever the major drama.&lt;br /&gt;&lt;br /&gt;More recently, companies like &lt;a href=&quot;http://www.innerwall.com/&quot;&gt;Innerwall&lt;/a&gt; and &lt;a href=&quot;http://www.securify.com/&quot;&gt;Securify&lt;/a&gt;, as well as stalwarts like &lt;a href=&quot;http://www.rsasecurity.com/node.asp?id=1155&quot;&gt;RSA&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/itsolutions/network/nap/default.mspx&quot;&gt;Microsoft&lt;/a&gt;, and &lt;a href=&quot;http://www.cisco.com/go/security&quot;&gt;Cisco&lt;/a&gt;, provide potential solutions. All have advantages and deal with the end computer, but most may be gamed. They are really only applicable in corporate settings where IT&#39;s additional software is in place, and are typically based on digital certificates.&lt;br /&gt;&lt;br /&gt;The most interesting solution comes from Innerwall, where a computer earns trust. The basis is differentiation. The computer type determines a great deal of the believability, due to physical controls, like good old fashioned locks and security guards. Servers are more trusted than PCs, which are more trusted than corporate laptops, and the trust continues down through remote corporate laptops, PDAs and eventually non-corporate laptops. The amount of time the computer is on (uptime), and peer-to-peer elections determine even more trust. If an end host has software that checks and makes sure the computer is &quot;in-line&quot; it receives additional trust. All of this information sums, similar to references and background checks. If a computer &quot;leaves&quot; for a brief stint, or acts remarkably different/erratic, he loses some credibility, which must be earned back.&lt;br /&gt;&lt;br /&gt;I still see this solution&#39;s weakness analogous to the double agent or sleeper cell. A stolen corporate laptop exposes the vulnerabilities of the software and settings. The idea is that the computer&#39;s not trusted enough to do any really damage. And you eventually must trust someone, right?</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/4203675457904776998/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/4203675457904776998?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/4203675457904776998'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/4203675457904776998'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2007/10/who-do-you-trust-why-would-you-trust.html' title='Who do you trust? Why would you trust THEM? - Authentication mechanisms and their computer analogs'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-3175829871543992485</id><published>2007-10-08T14:07:00.001-04:00</published><updated>2007-10-09T12:36:47.821-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IA"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Incident Management"/><category scheme="http://www.blogger.com/atom/ns#" term="SIM"/><title type='text'>Want not be hacked? Security Vendors - why less is more!</title><content type='html'>&lt;small&gt;Original Post on 10-Jul-06 5:30pm&lt;br /&gt;&lt;/small&gt;                     The IT industry loves advanced technology, even to the point of gadgetry. Some immature technologies are adopted simply for the gee whiz factor. Others have a specific niche application, and are money well spent. The IT staff spends time and effort integrating the new application into the enterprise architecture, and then rolls out the first release. Security in the past relied on these new, hot technologies; they were stand-alone, and the architects selected the best of breed product after a trade study or bake-off.&lt;br /&gt;&lt;br /&gt;This methodology worked well in the past; each new piece added received its own separate command and control structure and performed its stove-piped duties. Routers begat Firewalls begat Anti-virus begat IDS begat… IT spent more time distilling information, managing products and filing RFPs, and less time making the company more efficient/profitable/secure. Other niche vendors offered Security Incident Management products, hoping to ease the burden and consolidate Syslogs and IPS reports from disparate sources. This produced another product management specialist or further taxed the existing staff.&lt;br /&gt;&lt;br /&gt;As happens with maturing industries, vendors consolidated (see &lt;a href=&quot;http://www.ecademy.com/node.php?id=68989&quot;&gt;Why the Behemoths Buy Startups - The Business of Research &amp;amp; Development and Fortune 500&#39;s&lt;/a&gt;.) The larger companies&#39; integrated products became more easily managed, required less staff, and fewer end operation center consoles. The new product line also reduced operations center specialization. And yes, for you back-office folks, from a business perspective this lower cross-training is a benefit. Have you ever seen the pay checks for a &lt;i&gt;really&lt;/i&gt; good UNIX admin?&lt;br /&gt;&lt;br /&gt;Single vendor implementations have one other major advantage: outsourcing. A mid-sized restaurant business doesn&#39;t make money on the latest security roll-out, and would be better served paying lower total ownership costs to someone else familiar with those services. The Managed Security Service Providers are more than happy to oblige. MSSPs like dealing with a specific product set. They will take an upfront hit on replacing a few customer security products with their preference for later recurring revenue streams. Replacement simplifies their monitoring through use of the single vendors management and reporting tools bundled with products. And they can claim the latest releases with minimized testing and upgrade headaches. After all, the single vendor is responsible for the interoperation.&lt;br /&gt;&lt;br /&gt;Some readers may ask: &quot;What about the best of breed? Firewall product X is 15% more efficient at 95% bandwidth utilization and…&quot; or &quot;Antivirus product Y has 12 more virus signatures with…&quot;. One word: commoditization. Honestly ask yourself, by the time a head-to-head comparison reaches print, do you think Cisco, Symantec, or Microsoft have not already incorporated/road mapped whatever features they lacked? Major vendor mitigation strategies or defense in depth approaches abound, and the small players will not hold the top spot for long. They will be bought, or made inconsequential, as a great idea that everyone else incorporated. Ask the product set vendors. They&#39;re more than happy to tell you how they&#39;ve already overcome those anomalies. Their products are &quot;good enough&quot;, and will surpass any competitive deficiencies through sheer programming muscle&lt;br /&gt;&lt;br /&gt;This single vendor solution is by no means perfect. Each new acquisition requires a release just to change the startup screens and badging. After the first major revision, the acquirer&#39;s developers typically figure the new product out, and harmony returns to the vendor&#39;s product set. The &quot;commodity feature&quot; incorporation into existing products may likewise take a programming cycle, maybe even two. Your individual product security may suffer slightly, but the tools working in concert produce a higher security, complete solution. The advantages far outweigh the detractors.</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/3175829871543992485/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/3175829871543992485?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/3175829871543992485'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/3175829871543992485'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2007/10/want-not-be-hacked-security-vendors-why.html' title='Want not be hacked? Security Vendors - why less is more!'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-1453002804034172625</id><published>2007-10-08T14:03:00.000-04:00</published><updated>2007-10-09T12:37:00.840-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IA"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft silent update"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows Update"/><title type='text'>Want to hack ANYONE&#39;s computer? Just follow Microsoft&#39;s lead!</title><content type='html'>&lt;div&gt;&lt;small&gt;Original Post on 13-Sep-07 7:37pm: &lt;/small&gt;&lt;/div&gt;                              In an interesting move today, it is reported that &lt;a href=&quot;http://windowssecrets.com/comp/070913/#story1&quot;&gt;Microsoft is silently updating Windows XP and Vista.&lt;/a&gt;  I emphasize silently.  Remember &lt;a href=&quot;http://www.wired.com/politics/security/commentary/securitymatters/2005/11/69601&quot;&gt;Sony&#39;s rootkit debacle&lt;/a&gt;? There are no reports of problems, but when my machine mysteriously decided on its own that it was time to reboot in the middle of a presentation, it made me look bad, and question my IT staff. We don&#39;t have auto update turned off, but several of our customers do because of patching and regulatory restrictions. And this patch occurs even in the instances where customers turned off Windows Update!&lt;br /&gt;&lt;br /&gt;Lo and behold, Microsoft itself granted privileges on every single XP and Vista system.  With all the discussions about how &lt;a href=&quot;http://www.microsoft.com/technet/technetmag/issues/2007/01/SecurityWatch/&quot;&gt;trustworthy and secure new versions of Windows&lt;/a&gt; are, and the publicity surrounding Sony&#39;s music CD installations, it stands to reason that Microsoft would not want this capability under &lt;b&gt;any&lt;/b&gt; circumstances.&lt;br /&gt;&lt;br /&gt;So what does this imply to an information security professional? A back door. Cisco, Symantec, and McAfee all claim their security products are rock solid, and because of encryption, digital rights management, and other safety precautions are safe to use. In their &lt;a href=&quot;http://www.blackhat.com/html/bh-usa-07/bh-usa-07-speakers.html#Dror&quot;&gt;NACAttack &lt;/a&gt; presentation at Black Hat 2007, Dror-John Roecher and Michael Thumann showed just how safe Cisco&#39;s security protections are, and how complexity breeds difficulty in security. Cisco puts in a ton of security measures so that hackers can&#39;t connect to the network, and these researchers cracked it. Why make it any easier for an attacker, by giving them yet another vector to &quot;update&quot; files in the Operating System.&lt;br /&gt;&lt;br /&gt;I don&#39;t care if all of this is for the betterment of my computer experience; if I don&#39;t want it, or insist you ask me about, you&#39;re obligated to do just that. Explain the risks to me, then ask if I&#39;d like to install it now. That way, if I&#39;m in the middle of a presentation for a multi-million dollar sale, &lt;i&gt;I&lt;/i&gt; can quietly decide that now&#39;s not the best time for an update.</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/1453002804034172625/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/1453002804034172625?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/1453002804034172625'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/1453002804034172625'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2007/10/want-to-hack-anyones-computer-just.html' title='Want to hack ANYONE&#39;s computer? Just follow Microsoft&#39;s lead!'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9060302730450902062.post-9142434441022852510</id><published>2007-10-08T13:11:00.001-04:00</published><updated>2008-03-14T21:43:13.711-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Secure Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtual Machine"/><category scheme="http://www.blogger.com/atom/ns#" term="xB"/><title type='text'>Want to avoid wiretaps or questionable search and seizure? Try a secure computer on USB</title><content type='html'>Everyone wants a certain comfort level, especially with computers.  You like finding your programs on your system.  You want your bookmarks in FireFox or your buddy list on Instant Messenger.  What if you were able to do carry all of this on a USB thumb drive?  In fact, what if you were able to bring your entire &quot;computer&quot; with you on a USB memory stick?  How could you hope to secure it against viruses, keystroke loggers, or even un-trusted/hostile networks?  What about other users poking around for your files, or maybe reading your emails?&lt;br /&gt;&lt;br /&gt;Not long ago, I watched a show on Bravo called &quot;Flipping Out&quot; (actually my wife watches, and I&#39;m in the room…  honest.) where the protagonist, &lt;a href=&quot;http://www.bravotv.com/Flipping_Out/episodes/episode_105/index.php&quot;&gt;Jeff Lewis&#39; computer was changed by an employee&lt;/a&gt;, and Jeff couldn&#39;t use anything.  Sarah Jessica Parker&#39;s character in &quot;Sex and the City&quot; had a nervous breakdown when she had to go to a new computer.  The success of the &lt;a href=&quot;http://www.geeksquad.com/tools/supporttool.aspx?id=439&amp;amp;PSRCH&quot;&gt;Geek Squad&lt;/a&gt;, and a quick Google search for Computer Help show it&#39;s a big problem.  Microsoft made a big deal of their &lt;a href=&quot;http://www.microsoft.com/windowsxp/using/windowsvista/ballew_upgrade.mspx&quot;&gt;Windows Easy Transfer&lt;/a&gt; upgrade process from Vista to XP.  You should be able to see where a &quot;portable&quot; computer could be useful, especially if you travel a lot.  I&#39;m talking smaller than just a laptop.&lt;br /&gt;&lt;br /&gt;One of the earlier &quot;modern&quot; portable OSes was a minimized Linux distribution designed to fit on a CD.  &lt;a href=&quot;http://www.knopper.net/knoppix/index-en.html&quot;&gt;Knoppix&lt;/a&gt; was one of the first &quot;computers&quot; compacted enough to be portable with features like OpenOffice, web browsers, and email access expected in a recent desktop.  However, the security provisions were originally lax.  Now, with Virtual Machines (VM) from &lt;a href=&quot;http://www.vmware.com/&quot;&gt;VMWare,&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Xen&quot;&gt;Xen,&lt;/a&gt; and &lt;a href=&quot;http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx&quot;&gt;Microsoft&lt;/a&gt; all the rage, you&#39;d expect several possibilities.  I&#39;d like to discuss one in particular, designed &lt;i&gt;&lt;b&gt;completely&lt;/b&gt;&lt;/i&gt; around security.&lt;br /&gt;&lt;br /&gt;A few of the guys from the &lt;a href=&quot;http://www.cultdeadcow.com/&quot;&gt;Cult of the Dead Cow,&lt;/a&gt; the security researchers/hackers that released Back Orifice to Microsoft&#39;s dismay in the 90&#39;s, started a quest for a secure portable computing system.  Steve Topletz created &lt;a href=&quot;http://xerobank.com/xB_machine.html&quot;&gt; xB&lt;/a&gt; as a result of this work, and demonstrated the product at &lt;a href=&quot;http://www.portableprivacy.net/2007/08/defcon-15-review.html&quot;&gt;DefCon 15&lt;/a&gt;.  The description of the product from the xB website:&lt;br /&gt;&lt;blockquote&gt;&quot;xB Machine is the Secure Virtual Workstation™ that provides a safe computing environment for personal, professional, and corporate use. It is the ultimate user security and privacy tool, and the flagship of the XeroBank product line-up. Use it for safe and anonymous internet, surfing, email, encrypted messaging, and financial transactions. Put your computer in your pocket by placing xB Machine on a flash drive; thanks to virtualization technology it will be the same no matter where or on what computer you run it.&quot;&lt;/blockquote&gt;&lt;br /&gt;So what does a system like this give &lt;i&gt;you&lt;/i&gt;?  Probably not much unless you&#39;re paranoid, but the idea is nearly complete anonymity.  The encryption on this system is stronger than what the NSA requires for Top Secret information.  In fact, the Advanced Encryption Standard cryptography should be &lt;a href=&quot;http://www.keylength.com/en/compare/&quot;&gt;sufficient protection for the next 20 years.&lt;/a&gt;  This protects against immediate disclosure of the system in case of a lost or stolen key.  There is also a zeroize feature, where if you enter a password the entire key will erase itself.  The software pre-loaded on the system also pushes anonymization, as well as network connections incapable of snooping.&lt;br /&gt;&lt;br /&gt;From what I&#39;ve seen, the system takes care of data at rest, in transit, and in use.  The only thing I can think of is sharing data appropriately.  There are devices on the anonymous TOR network that could allow secure file transfer through SFTP.  There are applications for this work, although its release makes Intelligence collection (think terrorists) nearly impossible when used.  Then again, newspaper advertisements work even better.  Anyone seen &lt;a href=&quot;http://www.imdb.com/title/tt0401997/&quot;&gt;Breach?&lt;/a&gt;  In using the system, my observation is its speed is a bit slow.  But think about what you get.  How paranoid must you be before you find this necessary?&lt;br /&gt;&lt;br /&gt;Why would someone create such a cloak and dagger machine?  We live in a capitalist society, and although this does contribute to the security body of knowledge, my guess for the real reason for the system:  sales of the high speed XeroBank anonymous network connections.  Everyone has their motives, and people will pay especially when it comes to security.</content><link rel='replies' type='application/atom+xml' href='http://securemarks.blogspot.com/feeds/9142434441022852510/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/9060302730450902062/9142434441022852510?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/9142434441022852510'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9060302730450902062/posts/default/9142434441022852510'/><link rel='alternate' type='text/html' href='http://securemarks.blogspot.com/2007/10/want-to-avoid-wiretaps-or-questionable.html' title='Want to avoid wiretaps or questionable search and seizure? Try a secure computer on USB'/><author><name>Jon-Michael C. Brook</name><uri>http://www.blogger.com/profile/05157246802514165036</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>