Security engineering: broken promises

The following draft excerpt comes from my upcoming book. Republished with permission of No Starch Press.On the face of it, the field of information security appears to be a mature, well-defined, and an accomplished branch of computer science. Resident experts eagerly assert the importance of their area...

Risikopremien for Oslo Børs 1915-2009

Jeg har fjernet dette innlegget, da det ville kreve endel arbeid å kvalitetssikre beregningene tilstrekkelig. Det er uansett andre som har gjord dette bedre, så dersom du er ute etter anslag på risikopremien i Norge, anbefaler jeg:Elroy Dimson, Paul Marsh and Mike Staunton: "Credit Suisse Global Investment...

Vulnerability databases and pie charts don't mix

There are quite a few extensive vulnerability databases in existence today. While their value in the field of vulnerability management is clear and uncontroversial, a relatively new usage pattern can also be seen: the data is being incorporated into high-level analyses addressed predominantly to executive...