Author Archive for Pete Lindstrom

Fake Users Proliferating?

The issue of fake Internet users has been around for as long as the Internet, but it sure seems like they are really starting to proliferate. In the age of social networks and collaboration, this can be a real problem.…

Monoculture Revisited

It’s been eight years since the “great monoculture debate” hit the press with a storm. Bruce Schneier and Marcus Ranum take on the topic in their he says/she says column for searchsecurity, though it doesn’t appear that Schneier actually believes…

Firesheep makes us all evil

At what point did you begin to recognize that the world is much more complex than you think and that humans are even more complex than that? Eric Butler shows a kind of youthful ignorance that would be admirable if…

Vulnerability Creation vs. Discovery vs. Fix

Michael Janke at Last In, First Out is rightly concerned about the respective run rates of the vulnerability creation process and our ability to fix them individually. He asks the question “Are we creating new vulnerabilities faster than we are…

Are We Ready for This?

While this is not surprising, it is certainly unsettling: From the AVG Blog: Here is what we’ve found: 1 – The average age at which a child acquires an online presence courtesy of their parents is at six months, and…

Why Check Point should buy RSA

Well, things have changed from almost 10 years ago, but I was taking a trip down memory lane with the new HP – Arcsight acquisition and came across this. I suppose nowadays perhaps RSA (EMC) should be buying Check Point,…