Monthly Archives: February 2013

Website Collusion

After reading a post from What is Privacy on the Collusion tool that looks at the connections between web sites I thought I would install it myself. What was interesting after using it for half a day is that many … Continue reading

Posted in Security and Privacy | Tagged , , , | Leave a comment

Questionable Android App Permissions

On the Google Play Store you can find the App Permission Friendly Apps that will display and rate the permissions granted to an App on an Android phone. What is interesting is the wide range of permissions granted to apps … Continue reading

Posted in Security and Privacy | Tagged , , | Leave a comment

The Illusion of Facebook Blocking

Facebook is a great social networking tool that has provided an excellent way of communicating with family and friends but sometimes the the controls provide the illusion of privacy when they do not. Facebook can be configured to control who … Continue reading

Posted in Security and Privacy, Social Media | Tagged , , , | Leave a comment

Security without a Trusted Baseline?

Note: This posting is my own and doesn’t necessarily represent IBM’s positions, strategies or opinions. For over a decade I have been involved in deploying security controls across many hundreds of thousands of devices. When deploying any security controls, across … Continue reading

Posted in Security and Privacy | Tagged , , , | Leave a comment

Checklist for Presentation Logic

I have now created a check list to accompany the Using Logic for Productive Presentations and Reports presentation you can download from here and the PowerPoint presentation is here.

Posted in Presentations | Tagged , | 1 Comment