Richard Stiennon

Latest Posts

FTC on Spyware

FTC on Spyware

Dateline CeBIT, Hannover, GermanyThe FTC has published a report and conclusions from the workshop they held April 19th, 2004. The timing is significant because the House Commerce Committee has voted on and forwarded the SPY bill (HR 29) to the full House.

March 9, 2005 by in Security

A logical proposal

A logical proposal

Yesterday I talked about the risk to the computing world inherent in one platform everywhere. Many people have suggested that this is why Macs and other platforms should be tossed into the mix.

February 26, 2005 by in Hardware

Predictions, 2005

Predictions, 2005

I know it is late but here are my predictions for 2005. I actually did write these in December but since none of them have not come true yet now is the time to post them.

February 24, 2005 by in Security

Secure Network Fabric.

Secure Network Fabric.

A series of developments in network security are leading to the emergence of a comprehensive solution that could make the network so resilient that it is impervious to most attacks. Although no product vendor has proposed the specific combination discussed here all of the pieces are available today and early adapters could assemble the pieces.

February 22, 2005 by in Security

Knocking CNAC

Knocking CNAC

In the relatively short history of Internet Security it has been a long time since Cisco proposed their solution to the host security problem. It was July-August of 2003 that MSBlaster, a worm that infected most enterprises because laptops brought it in with them, highlighted yet another problem with enterprise security.

February 21, 2005 by in Networking

Top Stories