I recently was asked by Bloomberg to comment on the raft of Android malware recently discovered. During that interview I mentioned some concepts around the open vs closed models and wanted to expand on this thinking a little further. Continue reading “Open for Business?”
I have decided to plan my new musical platform in advance this time, rather than the usual method of buy something, expand on it, realise its not up to the job and then replace it. This essentially means that I am going to spend a great deal of time on google deciding something, then finding a better version of something and so one, until I eventually bite the bullet and invest. Continue reading “A new solution”
Personally, I think this is one of the most important concepts of today. Its simple enough to grasp and illustrates the point very well. Continue reading “The Asymmetry of Security”
I read an interesting article the other day about the fact that Cray have toppled IBM of the top spot in the super computer race with a staggering 1.64 Petaflops of processing grunt from its XT Jaguar supercomputer. Of course, I expect this will be short lived given the Roadrunner has a theoretical 1.7 Petaflop capacity.
……can be reverse engineered by mankind.
Its a simple mantra, but one that has served me well in security.