Previous month:
November 2012
Next month:
January 2013

December 2012

50 Years of Doctor Who

My daughter is an ultimate Doctor Who fan and is insisting we visit the Dr. Who Experience when we visit London next June (as a side trip to Cardiff, Wales). She's also converted me from a casual watcher to the guy on the aircraft with the Doctor Who ringtone. You can imagine how excited she was when we came across this infographic timeline:

Doctor Who Timeline Infographic

Via: CableTV.com

I did a bit more research on Doctor Who Timelines and found one by NathantheNerd. This timeline identifies the actors who played the Doctor and his companions for the episodes in seasons 1-6.


The (Sad) State of Application Security

Veracode has produced an informative infographic on the state of application security and has generously granted permission to use. This graphic is too dense to present to senior management and receive anything but blank stares and impatient tapping while you try to flounder through the statistics to give them something they can act upon decisively.

The simpler approach is to focus on one message at a time, keep the dialog simple, and recommend a way forward. Your senior management no doubt understands and appreciates data, databases, information integrity and confidentiality, so if you do use this infographic, try this:

Lecture
Databases are under siege. Not just ours, but everyone's databases. That's because nearly everyone is vulnerable to the same tactics attackers use to gain access to databases. What makes this threat a priority for us in 2013 is that it's not just the information we want to make accessible to our clients or customers, but potentially information in those databases that we want to keep confidential, like billing addresses, payment information or PII. Lastly, these same threats could be leveraged against any of our databases, even the ones that aren't directly accessible via the Internet. What this infographic says is that attackers are focusing on application level attacks, and we need to put more time, effort and expense into securing our applications

The State of AppSec 2012

Infographic by Veracode Application Security