Quantcast
Channel: The Confidential Resource » Risk Management
Browsing all 34 articles
Browse latest View live

Edit-for-Cash at Wikipedia

Sarah Stierch, a senior staffer at Wikipedia, was fired for taking cash for edits to the popular encyclopedia site. Stierch offered her services as a “long time Wikipedian, curator, researcher and...

View Article


The Individual First Aid Kit (IFAK)

Recent involvement in investigations into industrial accidents and incidents involving security officers caused me to look into the state of first-aid training. I have some concerns that...

View Article


Chrome is Listening

So you want to use Chrome as your browser. Are you aware that it has recently been reported that a Chrome Bug Allows Sites to Listen to Your Private Conversations? The best way to avoid this threat is...

View Article

Normalcy Versus Risk

Feral Dogs In the past I have written about the risks associated with feral dogs. Currently, the town of Kenora Ontario is experiencing some difficulties with feral dogs. Having a pack of feral dogs...

View Article

Surviving a Calamity

I sometimes hear someone argue that specialization has weakened society as individuals now have fewer skills with which to survive a calamity. This argument presupposes a sudden reversion to a rude...

View Article


Microsoft’s Ban on Guns & the Investigator

Since 2009 Microsoft’s Code of Conduct has been applied to more and more of their online services. Under this Code of Conduct, users are prohibited from using it in  “any way that promotes or...

View Article

Safe Recharging with a USB Condom

The mobile phone adaptor USB cable is a combination power-and-data connection that can expose your device to manipulation by some very unsavory characters. This practice is called Juicejacking and I...

View Article

Murder starts with your Mouth

The excellent book The Dark Side Of Man reports that David Luckenbill studied all of the murderers in a California county over a 10-year period and asked them why they killed their victims. All the...

View Article


Preparedness, Business Continuity, and Risk

A recent study indicates that a two day interruption of key business functions could cost your business $3M.  As most businesses are in urban areas, you could face much worse. One of my clients is...

View Article


Operational Security for Security Intelligence

The first of my 6 articles about maintaining operational security for the security intelligence function in the private sector is now online at Canadian Security Magazine.

View Article

Disk Encryption

TrueCrypt, the ultimate encryption freeware, abruptly announced that the software is no longer secure after Microsoft ended support for Windows XP. It was the most popular application of its type and...

View Article

Operational Security Part 2: Commercial Self-Defence

Over at Canadian Security Magazine, my first article explained the nature of security intelligence (SI) and its OPSEC challenges. This second article explains the OPSEC challenges facing security...

View Article

Image may be NSFW.
Clik here to view.

When the Security Guard’s Job Stops

The fifth annual Horizon Scan Report published by the Business Continuity Institute, in association with BSI illustrates that physical security and related issues are growing concerns amongst business...

View Article


The Mac & Malware

Like many Mac users, I’m not too concerned about malware. Traditionally, the vast majority of these were directed at Microsoft OS platforms. But recent headlines prompted me to consider two pieces of...

View Article
Browsing all 34 articles
Browse latest View live