Tags » Security » Page 2

Eight Privacy Principles - from OECD

All people/companies must know these eight privacy principles

PART TWO. BASIC PRINCIPLES OF NATIONAL APPLICATION

Collection Limitation Principle

7. There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. 380 more words

Requirements Management

Travel Troubles

I’m off to a land of magic and adventures! Hah. I wish. But I am going to fly, which is fun. The downside is that I have to go through security, which is not. 27 more words

Pirateaba

A System is Stronger with Variability, and Learning from Failures

Just recently I came across a book called Antifragile by the author Nassim Nicholas Taleb. Taleb describes a phenomena he coins as “antifragile” in which a system gains strength from past failures. 260 more words

Antifragile

Man Carries 7-Inch Knife Into Ramsey County Courthouse

MINNEAPOLIS (WCCO) – Investigators want to know how a man got a large knife through security at the Ramsey County Courthouse.

Documents say Ishmael Williams was wanded and allowed through security on Tuesday. 64 more words

News

That we live in the world where we aren’t sure if any given cyberattack is the work of a foreign government or a couple of guys should be scary to us all…

51 more words
Culture

Why The Future Of Digital Security Is Open

Editor’s note: Lou Shipley is a lecturer at the Martin Trust Center for MIT Entrepreneurship and president and CEO of Black Duck Software, an open source solutions company. 514 more words

TC

netizencorp reblogged this on The Netizen Blog and commented:

No longer can we use "security through obscurity" excuses to explain how so called "closed," or compiled and obscured, software is more secure. Open source is the future, and is more adaptable and responsive to community demands and security issues. When in doubt, however, open source also allows companies such as ours full access to all code resources, which we can comprehensively scan and analyze, to ensure the most robust level of software security possible for critical environments.