Welcome to our fully functional beta site. We welcome all comments
informed!
The Informatica blog - Authored by Claudiu Popa
  • Ebay breach: Are we asking the wrong questions?The press release informing the media that eBay customers will be asked to change their passwords as a result of a 'cyberattack that compromised a database' isn't so much about the lost passwords, which admittedly were encrypted. It's about the psychology of announcing to 233 million people that their personal information is now in the hands of criminals, and doing so nonchalantly.
  • In the early 1920s, the Enigma machine was a portable encryption machine with rotor scramblers used for encoding and decoding confidential messages. It was progressively developed over the decades to use additional rotors and technical complexity that boosted the incremental difficulty of cracking its codes. And so began an elegant, noble cat-and-mouse game between coders and decoders that has stood the test of time. Or so we've been led to believe...
  • Netflix just the latest brand used in wave of phone text support fraudEver wonder what the use of stealing millions of email addresses is? All those often downplayed, 'low sensitivity' data breaches have massive potential to create enough uncertainty for people to eventually call a 1-800 number, even it it means speaking to a passive-aggressive tech support professional. This article explores the mindset that has led the public to belittle scammers even as organized crime defrauds the masses on a global scale.
    Posted in
    Crime , Global scope
  • Layered SecurityI'm often surprised at the public's disappointment with the realization that security processes are not directly analogous to the medical notion of immunization. In fact, single-shot protection does exist, and it serves to defuse individual threats with the simple application of patches, firewall filtering or other methods of protecting against single attack vectors.
  • A passion for protecting the intangiblePeople often confuse information protection with IT security. One of the reasons I resist the compartmentalization of my craft  as IT security is that, as important as it is, IT security not only reduces the scope of my work by at least two-thirds, but it misses the point of what it means to truly enable protection for the intangible. It absolutely depends on people who are interested, educated and dare I say it, passionate. Security doesn't work without a high level of consistent human engagement. Privacy fails without passion and respect. In fact, nothing I can think of works well without a high degree of emotional investment.
     
    Why is this? Why can’t we systematize everything and build an app for it? Because we are dealing with a substance free from physical properties. Information is intangible, tasteless, colorless and for the most part, odorless. It is perhaps the most impactful of substances, driving world economies and impacting everyone on the planet on a very individual level. And so, our relationship with information is very personal and delicate. Although it doesn’t impact our senses the way a piece of cheese or silly putty do, it can assault our being and drive our existence in powerful ways. And yet, we can't touch it.
1 | 2 Last

In the early 1920s, the Enigma machine was a portable encryption machine with rotor scramblers used for encoding and decoding confidential messages....
Bleeding hearts unite, the OpenSSL Heartbleed bug threatens to impact user privacy and business security online. There's a new security vulnerability in town. It's not even that new, we just didn't know about it until now. But it's a whopper and it threatens to i...
Independent risk assessments are the most basic best practice in business.Security is about risk. And risk is about numbers. Given the high probability of suffering data security and privacy breaches, is it any wonder compan...
Netflix just the latest brand used in wave of phone text support fraudEver wonder what the use of stealing millions of email addresses is? All those often downplayed, 'low sensitivity' data breaches have massive potent...
Layered SecurityI'm often surprised at the public's disappointment with the realization that security processes are not directly analogous to the medical notion of im...
Target breach will have serious consequencesThis past Christmas season hasn't been kind to the Target chain of retail stores nor to its brand. A brazen attack took place in December that affecte...

Welcome to Informatica

Be Secure.

Be Trusted.

Follow us on