Excellent Brookings paper: “Why data ownership is the wrong approach to protecting privacy.” From the introduction: Treating data like it is property fails to recognize either the value that varieties of personal information serve or…
List of data breaches and cyber attacks in…
The shortest month of the year is over in a flash, but not before a significant number of data breaches and cyber attacks could take place. I count this month’s total of leaked records to…
How to Set Up Metrics to Optimize Your…
Posted by acarlisleOver the past six years, our team at Fractl has studied the art of mastering content marketing press coverage. Before moving into Agency Operations, I on-boarded and trained over a dozen new associates…
Stealing Nativity Displays
The New York Times is reporting on the security measures people are using to protect nativity displays.Read more: schneier.com
Human Rights by Design
Good essay: "Advancing Human-Rights-By-Design In The Dual-Use Technology Industry," by Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert: But businesses can do far more than these basic measures. They could adopt a "human-rights-by-design"…
5 Real Examples of Advanced Content Promotion Strategies
Posted by bsmarketerContent promotion isn’t tweeting or upvoting. Those tiny, one-off tactics are fine for beginners. They might make a dent, but they definitely won’t move the needle. Companies that want to grow big and…
How to Have the Ultimate Traffic & Conversion…
Traffic & Conversion Summit is the largest conversion conference in North America. And this year will be the biggest one yet! I know, I know. We say this every year… But with 6,000 attendees projected for 2019, this will be the…
MD5 and SHA-1 Still Used in 2018
Last week, the Scientific Working Group on Digital Evidence published a draft document -- "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital and Multimedia Forensics" -- where it accepts the…
Friday Squid Blogging: Illegal North Korean Squid Fishing
North Korea is engaged in even more illegal squid fishing than previously. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read…