Professors: stop assigning group projects! (Guest Post)

NB: Written by Kevin Thompson on September 2, 2013 and republished with his permission.

Understanding attribution

One of the most popular and enduring forms of mystery fiction is the whodunit. Readers and audiences love following along to try to determine the actual identity of the attacker based on the clues and observations provided. During and after incident investigations, many folks - from the actual investigators on the case up to the armchair DFIR public - try to figure out the same thing. Unlike “whodunit” fiction, though, we may not have all the information needed. Indeed, we may never even get confirmation of the right answer.

Why does language evolution frustrate us?

In the late 1990s, when I first started working with network diagrams, we frequently used cloud symbols to represent the Internet or any other network that we weren’t going to represent in detail. From this sort of metaphor grew the concept of “cloud” computing, as in “computers somewhere else you don’t have to think about”. Of course, that has evolved into an entire sub-industry of SaaS / PaaS / IaaS as well as private or public or hybrid setups. For some reason, though, lots of people in security and IT in general get frustrated about this term.

Rafal Los spews racism

NB: This was originally published as a gist.