Skip to main content

The WiKID Blog

The WiKID Blog, musings on two-factor authentication, information security and some other stuff.

the-start-of-a-trend

One can hope: An eternal optimist asks Enterprise Vendors to pave the way for two-factor authentication.

the-price-of-managerial-neglect

I would think that this kind of research would be applicable to Information Security:

incentive-plan-for-an-information-security-team

It has occurred to me that you could develop an interesting incentive program for an information security team, assuming that you believe a couple of data points (or can come up with your own) and your primary concern is a data breach. In my opinion, security people are all too often incented only to maintain security - not to optimize the investment in security. Interests need to be aligned.

the-halo-effect-and-business-performance

I really enjoyed a recent 'manifesto' from the ChangeThis site recently by Phil Rosenzweig called Forget Formulas . In it he points out the flaws in many management books that purport to find a formula for success based on a large quantity of mainly anecdotal evidence. The data is suspect because of the 'halo effect' (also the title of Rosenzweig's book):

The key weakness is the halo effect, a concept that was first identified by psychologist Edward Thorndike in 1920. It refers to the basic human tendency to make specific inferences on the basis of an overall impression. People tend to have an overall evaluation about someone or something, and let that evaluation shape specific features. the halo effect is found in many walks of life, including the way we evaluate job candidates—the graduate from a well-respected school tends to look good across the boards, while a graduate from an unheralded local school tends to look less attractive. Brand building, too, is based on the halo effect—companies know that consumers will attribute favorable qualities to a product from a respected company, and therefore go to great lengths to create positive associations with their brand.

i-for-one-welcome-our-ceylon-overlords

From the Register:

A US defence department advisory board has warned of the danger that American war robots scheduled for delivery within a decade might be riddled with malicious code. The kill machines will use software largely written overseas, and it is feared that sinister forces might meddle with it in production, thus gaining control of the future mechanoid military.

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom