Dr Anton Chuvakin Blog (Original)

This is Anton Chuvakin original blog (pre-Gartner) that I will now use to backup my Medium blog content (2023+)

Thursday, September 07, 2006

"Hacking Still Can’t Outdo Stupidity for Data Leaks"

Love the title - I would say that it is pretty much the theme of our time: "Hacking Still Can’t Outdo Stupidity for Data Leaks"
Posted by Anton Chuvakin at 7:51 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Dr Anton Chuvakin

Dr Anton Chuvakin

RSS Feed

Subscribe Follow @anton_chuvakin

Recent Books

My Links

  • "PCI Compliance" book site
  • My website
  • My old presentations
  • My old portal Info-Secure.org
  • Old "Security Warrior" Book Site

Twitter

    follow me on Twitter

    Top Popular Posts

    • The Last Blog Post!
      This is my last blog post –for the foreseeable future. It is dated 7/31/2011 at 11:59PM. What happens tomorrow? A new life, of course! As...
    • Simple Log Review Checklist Released!
      Today, many people are looking for very simple solutions to big and complex problems – and the area of logging and log management is no exc...
    • Why No Open Source SIEM, EVER?
      Here is a perfect weekend post – on SIEM :-) Ok, all this Google web traffic of people searching for “ open source SIEM ” (sometimes “ ope...
    • Monthly Blog Round-Up – January 2018
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts based on last month’s visitor data  (excluding o...
    • Monthly Blog Round-Up – May 2017
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “New SIEM Whitepaper on Use C...

    Topics

    security (1012) log management (340) logging (308) compliance (234) PCI (187) logs (176) security management (129) reading (121) Monthly (119) conference (117) personal (95) blogging (92) trends (91) SIEM (89) humor (86) musings (83) presentation (75) SIM (67) SEM (64) future (46) news (46) malware (40) stupidity (40) intrusion (37) predictions (36) chuvakin (35) poll (31) RSA (30) standards (30) book (29) market (29) incident (28) SANS (27) paper (27) loglogic (26) risk (24) tips (23) warfare (23) CEE (19) PCI_Log_Review (19) marketing (19) Medium (17) TysonRhame (17) vendors (17) research (16) ROI (15) vulnerability (15) cloud (14) honeynet (14) privacy (14) 2010 (13) book review (13) forensics (13) metrics (12) Annual (11) jobs (11) review (10) 2009 (9) DLP (9) Medium Backup (9) data protection (9) podcast (9) websec (9) business (8) economics (8) saas (8) strategy (8) webinar (8) awareness (7) insiders (7) legal (7) 2008 (6) BlackHat (6) Detection Engineering (6) Gartner (6) attack (6) LogChat (5) career (5) consulting (5) database (5) haiku (5) myth (5) product management (5) qualys (5) security theater (5) software (5) virtual (5) 2007 (4) FAIL (4) application (4) encryption (4) incident response (4) mistakes (4) search (4) travel (4) virtualization (4) visualization (4) web logs (4) windows (4) 2011 (3) DRM (3) GRC (3) NIST (3) audit (3) awesomeness (3) correlation (3) government (3) interview (3) intrusion detection (3) open source (3) perimeter (3) politics (3) pontification (3) questions (3) vulnerability management (3) 2012 (2) HIPAA (2) ShmooCon (2) access (2) best practices (2) competitive (2) cybercrime (2) e-discovery (2) evangelism (2) glossary (2) keynote (2) knowledge management (2) new (2) rootkit (2) stratfor (2) tools (2) twitter (2) 0day (1) 2013 (1) 2019 (1) 2020 (1) Android (1) Cloud Threats (1) EMAP (1) IANS (1) IPv6 (1) SOC (1) analogy (1) announcements (1) architecture (1) authentication (1) blo (1) comments (1) computers (1) controversy (1) cool (1) current (1) data mining (1) fraud (1) geopolitics (1) guest post (1) identity (1) innovation (1) linux (1) mobile (1) obvious (1) platform (1) policy (1) reflections (1) semantic (1) storage (1) video (1) whitepaper (1)

    About Me

    Anton Chuvakin
    View my complete profile

    Blog Archive

    • ►  2024 (18)
      • ►  December (2)
      • ►  October (2)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (5)
      • ►  February (2)
      • ►  January (1)
    • ►  2023 (8)
      • ►  December (1)
      • ►  November (2)
      • ►  October (5)
    • ►  2019 (1)
      • ►  July (1)
    • ►  2018 (7)
      • ►  August (2)
      • ►  June (1)
      • ►  May (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2017 (12)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2016 (14)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2015 (15)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (3)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2014 (14)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (3)
      • ►  February (1)
      • ►  January (1)
    • ►  2013 (15)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2012 (25)
      • ►  December (3)
      • ►  November (2)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (3)
      • ►  June (2)
      • ►  May (2)
      • ►  April (2)
      • ►  March (2)
      • ►  February (2)
      • ►  January (2)
    • ►  2011 (68)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (12)
      • ►  June (4)
      • ►  May (8)
      • ►  April (6)
      • ►  March (10)
      • ►  February (8)
      • ►  January (13)
    • ►  2010 (137)
      • ►  December (22)
      • ►  November (12)
      • ►  October (6)
      • ►  September (11)
      • ►  August (15)
      • ►  July (7)
      • ►  June (6)
      • ►  May (10)
      • ►  April (10)
      • ►  March (14)
      • ►  February (15)
      • ►  January (9)
    • ►  2009 (193)
      • ►  December (11)
      • ►  November (12)
      • ►  October (23)
      • ►  September (16)
      • ►  August (15)
      • ►  July (13)
      • ►  June (18)
      • ►  May (11)
      • ►  April (20)
      • ►  March (19)
      • ►  February (14)
      • ►  January (21)
    • ►  2008 (311)
      • ►  December (18)
      • ►  November (20)
      • ►  October (23)
      • ►  September (15)
      • ►  August (19)
      • ►  July (19)
      • ►  June (22)
      • ►  May (28)
      • ►  April (45)
      • ►  March (27)
      • ►  February (33)
      • ►  January (42)
    • ►  2007 (479)
      • ►  December (21)
      • ►  November (44)
      • ►  October (57)
      • ►  September (57)
      • ►  August (51)
      • ►  July (49)
      • ►  June (34)
      • ►  May (39)
      • ►  April (21)
      • ►  March (30)
      • ►  February (30)
      • ►  January (46)
    • ▼  2006 (370)
      • ►  December (24)
      • ►  November (25)
      • ►  October (24)
      • ▼  September (31)
        • NIST Log Management Guide 800-92 is Final!
        • GFP Rating of Militaries
        • Do You Compete with Dumbasses? A Simple Test for S...
        • Logging AS a Privacy Risk? Discussion Ensued :-)
        • Truly Amazing Shortsightedness...
        • Anton Security Tip of the Day #4: Code 200 = Code ...
        • Access or Access+Audit?
        • Working for a Leader in a Space
        • Alien vs Predator aka XSS vs Overflow :-)
        • It Is NOT Just Requirement 10!
        • Speaking at SANS (October 4th, 2006)
        • OMG, Not Another Security Analogy!
        • More Musings on the Future
        • It IS a Joke, Isn't It?
        • Infosec to TSA [humor, well, kind of sad]
        • Is Dataloss A New Web Defacement?
        • Vendors, Lies and Users :-)
        • Am I On? Security Bloggers A-List!
        • On "Top SIX Reasons Why I [Fred Avoio] Hate Networ...
        • Are You Into PCI...?
        • On Incidents and Military vs Business
        • So Is The Worm Dead?
        • "Hacking Still Can’t Outdo Stupidity for Data Leaks"
        • I Like it When They Say it Like This :-)
        • On Top 11 Reasons [Some Think] Security Products D...
        • The fun "Security is Like..." Item
        • On Insider/Outside Mini-Closure :-)
        • On Achieving Closure in Security
        • "The Biggest Military Hacks of All Time" List
        • (IN)SECURE Issue 1.8 with My PCI Article is Out
        • Anton Security Tip of the Day #3: Watch for Failur...
      • ►  August (34)
      • ►  July (31)
      • ►  June (23)
      • ►  May (20)
      • ►  April (52)
      • ►  March (41)
      • ►  February (33)
      • ►  January (32)
    • ►  2005 (34)
      • ►  December (34)

    Labels and Tags

    Copyright Anton Chuvakin. Simple theme. Powered by Blogger.