Archive for the “Reports and Data” category

Paper: “The Future of Work is Play”

by adam on December 1, 2011

My colleague Ross Smith has just presented an important new paper, “The Future of Work is Play” at the IEEE International Games Innovation Conference. There’s a couple of very useful lessons in this paper. One is the title, and the (…)

Read the rest of this entry »

Big Brother Watch report on breaches

by adam on November 30, 2011

Over at the Office of Inadequate Security, Dissent says everything you need to know about a new report from the UK’s Big Brother Watch: Extrapolating from what we have seen in this country, what the ICO learns about is clearly (…)

Read the rest of this entry »

More on Authorization Persistence Threats

by adam on November 18, 2011

Wade Baker has a quick response to my “Thoughts on the 2011 DBIR and APT,” including the data that I was unable to extract. Thanks!

Block Social Media, Get Pwned

by adam on November 17, 2011

At least, that’s the conclusion of a study from Telus and Rotman. (You might need this link instead) A report in IT security issued jointly by Telus and the Rotman School of Management surveyed 649 firms and found companies that (…)

Read the rest of this entry »

Thoughts on the 2011 DBIR and APT (Authorization Preservation Threats)

by adam on November 7, 2011

So Verizon has recently released their 2011 DBIR. Or perhaps more accurately, I’ve managed to pop enough documents off my stack that my scribbled-on notes are at the top, and I wanted to share some with you. A lot have (…)

Read the rest of this entry »

Diginotar Quantitative Analysis (“Black Tulip”)

by adam on September 13, 2011

Following the Diginotar breach, FOX-IT has released analysis and a nifty video showing OCSP requests. As a result, lots of people are quoting a number of “300,000”. Cem Paya has a good analysis of what the OCSP numbers mean, what (…)

Read the rest of this entry »

Why Do Outsiders Detect Breaches?

by adam on April 20, 2011

So I haven’t had a chance to really digest the new DBIR yet, but one bit jumped out at me: “86% were discovered by a third party.” I’d like to offer up an explanatory story of why might that be, (…)

Read the rest of this entry »

Dark Reading Virtual Event & Evidence-Based Risk Management

by alex on February 3, 2011

Hey, I know it’s late notice, but I’ll be speaking at 10:30 EST today on EBRM and the Verizon DBIR: https://www.techwebonlineevents.com/ars/eventregistration.do?mode=eventreg&F=1002809&K=CAA1BC&tab=agenda Alex

Another critique of Ponemon’s method for estimating ‘cost of data breach’

by Russell on January 26, 2011

I have fundamental objections to Ponemon’s methods used to estimate ‘indirect costs’ due to lost customers (‘abnormal churn’) and the cost of replacing them (‘customer acquisition costs’). These include sloppy use of terminology, mixing accounting and economic costs, and omitting the most serious cost categories.

A critique of Ponemon Institute methodology for “churn”

by adam on January 25, 2011

Both Dissent and George Hulme took issue with my post Thursday, and pointed to the Ponemon U.S. Cost of a Data Breach Study, which says: Average abnormal churn rates across all incidents in the study were slightly higher than last (…)

Read the rest of this entry »