Published on Oct 13, 2016
While the 7th Battle of the Isonzo River was still raging, Italian chief of staff Luigi Cadorna was already planning the 8th. The war of attrition was going in his favour even though the Italian losses began to mount too. But how long could Austria-Hungary keep up against the constant pressure?
October 14, 2016
Deadly Routine On The Italian Front – The 8th Battle Of The Isonzo I THE GREAT WAR – Week 116
QotD: You can’t fix network security by changing the users
Every few years, a researcher replicates a security study by littering USB sticks around an organization’s grounds and waiting to see how many people pick them up and plug them in, causing the autorun function to install innocuous malware on their computers. These studies are great for making security professionals feel superior. The researchers get to demonstrate their security expertise and use the results as “teachable moments” for others. “If only everyone was more security aware and had more security training,” they say, “the Internet would be a much safer place.”
Enough of that. The problem isn’t the users: it’s that we’ve designed our computer systems’ security so badly that we demand the user do all of these counterintuitive things. Why can’t users choose easy-to-remember passwords? Why can’t they click on links in emails with wild abandon? Why can’t they plug a USB stick into a computer without facing a myriad of viruses? Why are we trying to fix the user instead of solving the underlying security problem?
Bruce Schneier, “Security Design: Stop Trying to Fix the User”, Schneier on Security, 2016-10-03.