• Publications
  • Influence
Convergence
  • D. Geer
  • Computer Science
    IEEE Secur. Priv.
  • 2006
Risk Aversion
  • D. Geer
  • Computer Science
    IEEE Secur. Priv.
  • 1 September 2012
There's some risk aversion at play in cybersecurity; risk aversion is why a General Counsel will say that if you might have lost data, then you have to act as if you did lose it. Risk aversion is why
Information security is information risk management
TLDR
It is argued that the approach to information security from the ground up must be reconsidered if it is to deal effectively with the problem of information risk, and a new model inspired by the history of medicine is proposed.
Penetration testing: a duet
Penetration testing is the art of finding an open door. It is not a science as science depends on falsifiable hypotheses. The most penetration testing can hope for is to be the science of insecurity
Web Security Sourcebook
TLDR
This book discusses basic Browser Security and User Privacy, as well as Transaction Security and the Web, and creating Secure CGI Scripts for Secure Web Commerce.
Ownership
  • D. Geer
  • Computer Science
    IEEE Secur. Priv.
  • 2019
TLDR
This document is responsible for ensuring this document is necessary, reflects actual practice, and supports organization policy.
Information Security: Why the Future Belongs to the Quants
Although most businesses say information security is a primary concern, few have adequate systems in place because securing information requires a risk-management approach with dependable,
You Are What You Eat
  • D. Geer
  • Medicine, Computer Science
    IEEE Secur. Priv.
  • 1 July 2018
Every line of application glue code there is exists for one reason—to make omnivorous ingestion possible.
Power. Law
  • D. Geer
  • Computer Science
    IEEE Secur. Priv.
  • 2012
TLDR
Paying close attention to the ferment over whether new network designs with security in mind are worth the societal price and effort to actually implement in a world that already has a considerable sunk investment in structure is important.
A Time to Rethink
  • D. Geer
  • Computer Science
    IEEE Security & Privacy
  • 1 July 2010
This issue's column revisits For Good Measure's two primary indices: an index for stolen information one on the day-to-day pressure under which information security professionals operate, and looks
...
1
2
3
4
5
...