Create an Account
username: password:
 
  MemeStreams Logo

the country we've become

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
the country we've become
Topic: Miscellaneous 11:53 am EDT, Apr 26, 2015

Gregory D. Johnsen:

This is John Brennan's story, his life and his career. But it's also ours. The excesses and mistakes of more than a decade of war, what we tolerate and what we don't. What we're willing to forgive and what we won't. Politicians who don't deliver on their promises, and well-intentioned individuals who bring about great harm. It's about the man he is, and the country we've become.

Violet Blue:

DHS is out of step, out of touch, and so arrogant and ambivalent with a keynote like Johnson's that it's actually surprising at the end of the day that they can't even try to fool us into believing that cybersecurity isn't just another thing they have to pretend to understand until they retire.

DoD:

We are vulnerable in this wired world. Today our reliance on the confidentiality, availability, and integrity of data stands in stark contrast to the inadequacy of our cybersecurity.

Amit Yoran:

I don't think security breaches are stoppable in the current computing paradigm.

Michael Schmidt:

Inside the White House, the intrusion has raised a new debate about whether it is possible to protect a president's electronic presence, especially when it reaches out from behind the presumably secure firewalls of the executive branch.

John Leyden:

Embedded Packet Capture (EPC) was designed by Cisco as a troubleshooting and tracing tool. The feature allows network administrators to capture data packets flowing through a Cisco router. Brazilian security researchers Joaquim Espinhara and Rafael Silva were able to abuse the feature and build a system to hoover up massive volumes of data.

Niels Provos:

Had the entire web already moved to encrypted traffic via TLS, such an injection attack would not have been possible. This provides further motivation for transitioning the web to encrypted and integrity-protected communication.

Alex Stamos:

These days, network security has to be pushed into the end nodes ...

Morgan Marquis-Boire:

The big take-away is that cleartext is just dead.



 
 
Powered By Industrial Memetics
RSS2.0