The Need If, like me, you are travelling across Europe with your tablet, smart phone or laptop you too probably also want to be able to tap into the extensive and relatively fast mobile network. After all, Europe is a relatively small place, and getting a pre-paid 1 or 2 GB Data SIM, that can …
Category: tmc
About TMCiolek
Sep 07
Technolgy is wonderful. Until it is not.
Technology is such a wonderful thing, until it it not. As some of you might know, I am overseas. Travelling across Europe. Taking a lot of pictures, and generally enjoying myself. The problem arose a few days ago, in a small German town called Deggendorf. The older, smallish 250GB HDD in my laptop started misbehaving …
Jul 02
Something Different: Invictus
There are time where a bit of potery is good for the soul. Invictus Out of the night that covers me, Black as the pit from pole to pole, I thank whatever gods may be For my unconquerable soul. In the fell clutch of circumstance I have not winced nor cried aloud. Under the bludgeonings …
Jun 26
Consequences and “Risk Appetite”
Philosophy of Security, part 8 – Risk Management – Consequences and “Risk Appetite” So far, looking back at security discussion series in part 7 we took a side trip to explore a different way of looking at vulnerabilities called the Attack Surface. Earlier, in part 5, we have looked at the overall Risk Management process …
Jun 25
What is an “attack surface”?
Philosophy of Security, part 7 – Risk Management – What is and “attack surface”? In part 6 we have discussed threats and vulnerabilities, their relationship with each other and with overall idea of risk. This post is a small side trip to explore a related concept. There is a related concept, that is often used …
Jun 25
Risk Management – Threats and Vulnerabilities
Philosophy of Security, part 6 – Risk Management – Risks: Threats and Vulnerabilities In previous part, Part 5 of this series we discussed the general approaches to Risk Management. In this part I wish to take a closer look at the heart, and technically, the most difficult part of the process – Risk Analysis – …
Jun 18
Psychology of Fear and Safety
Philosophy of Security, Part 4 – On psychology of fear and safety. In part 1 and part 2 of this series, I have looked at, in very general terms, what security is about and why we bear the costs associated with it. It has occurred to me that before we can move onto discussion of …
Jun 16
On Psychology of Trust
Philosophy of Security, Part 3 – On psychology of trust. In part 1 and part 2 of this series, I have looked at, in very general terms what security is about and why we bear the costs associated with it. It has occurred to me that before we can move onto discussion of risk management …
Jun 13
Why do we do security?
Philosophy of Security, Part 2 – Why do we do “security”? In Part 1 of this series we have looked at a high level concept of what it is that we are dealing when when we talk about security. No matter what else you might think on this topic, there is one fact about security …
Jun 11
What is “security”
Philosophy of Security, Part 1 – What is “security”? Recently I have been watching a lot of videos and reading quite a few articles about “security”. While they contain a lot of information about techniques and technologies used to provide “security”, very few of these publications attempt to explain what security is all about. So, …