Ed Moyle

Ed Moyle
allow approval bush change country decide decisions department level president since subject ultimately voice whether
Since all ICANN decisions are subject to approval by the U.S. Department of Commerce, President Bush can ultimately decide whether or not to allow that change to proceed. No other country has that level of voice in the process.
attack attractive far game general likely looking might platforms purpose target trends ultimately
If the trends continue, I think it is likely that game platforms will become a more attractive target for attack in the future. Looking far enough ahead, game platforms might ultimately become an even more attractive target than general purpose PCs.
cautious full goal known quantity taking turning ultimate understanding
I'm cautious about taking a functioning known quantity and turning it into something else -- at least without a full understanding of what the ultimate goal is.
advantages attempted beneficial business directly found number offering provide restrict sanctioned
Even if IM isn't used directly for business purposes, a number of organizations still find it beneficial to provide a standardized IM channel. When IM was emerging, many enterprises attempted to restrict IM use, but found there were administrative advantages to offering a sanctioned and standardized IM portal.
across bar enterprise high might rather security setting systems
Rather than setting a universally high security bar across all systems in the enterprise, an enterprise might segregate systems into different 'zones,'
changes difference existing fraud funds maybe mechanisms technology using
There's no fundamental difference between using QuickBooks to embezzle funds and using a ledger to embezzle funds, ... The technology just changes how the fraud is accomplished and maybe who commits it; it doesn't change why it's committed. As long as there are criminals, they will find a way to use the existing mechanisms to their advantage.
advise documents enterprise issues leverage method office patches possible soon strongly within worms
Mass-mailing worms will often leverage issues in Office as part of their method of propagation. As such, I strongly advise that these patches be installed as soon as possible -- particularly within the enterprise where the e-mailing of Office documents is more commonplace and expected.
allowing altogether coming concern content exclude extension files filter filtering gateway majority office pass search smooth software transition
It allows virus-checking software in an e-mail to filter on that extension and to search files coming in with that extension more carefully, or to exclude them altogether on a content filtering gateway while allowing the majority of the office docs to pass through without hindrance. My only concern is making a smooth transition to the new format.
aim breach closer entirely expensive relatively small threat toward zero
Getting the threat of breach entirely to zero is effectively impossible, even in relatively small enterprises. And the closer we aim toward zero, the more expensive and time-consuming it becomes.
balanced diverse diversity events impact increase maximum reduce small thereby
Make diversity too small and you increase the impact of population-level events, make it too diverse and you can reduce manageability and thereby make individual-level events more likely. Heterogeneity has to be balanced with manageability for the organization's maximum benefit.
attempt best decisions management ongoing quantify security understand worked
The best security organizations I've worked with understand and attempt to quantify the risk-management decisions they make on an ongoing basis.
management reflects worry
Worry in a CIO reflects uncertainty in the management process.
account difficult enterprise fact job keeping large machines might secure thousands time
When you take into account the fact that a large enterprise might have tens of thousands or hundreds of thousands of machines, the job of securing those machines is very difficult and keeping them secure over time is even more difficult still.
black community contingent events hackers hacking hat information mainstream neither security seems sides since
There's also usually a black hat contingent at most mainstream security conferences. Since information security and hacking are two sides of the same coin, many hackers go to security conferences and many security professionals go to hacker events -- neither community seems to mind.