Squeezing the Cybersecurity Lemons – A Labeling Regime for IoT Products
IoT security labels must be developed accounting for the diversity of devices and deployment contexts, the sustainability of labeling regimes, and the user experience of consumers.
Authors: Vaibhav Garg, Andreas Kuehn
Article shepherded by: Rik Farrow
Practical Doomsday
A thoughtful review of risks faced in developed countries, and what you can do to be prepared.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
(How) Do people change their passwords after a breach?
Our research shows that many users ignore serious warnings about the need to change passwords and not reuse them.
Authors: Sruti Bhagavatula, Lujo Bauer, Apu Kapadia
Article shepherded by: Rik Farrow
It's Good to be Lazy
Taking good notes allows you to be lazy: you won't have to search for solutions to problems you have already solved before. I also suggest tools that help with note-taking.
Authors: Andreas Gerler
Article shepherded by: Rik Farrow
A Vulnerable System
An easy-to-read book covering the history of computer security.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Gazing into the VOID
Laura Nolan argues that reading incident reports can improve our ability to respond to production problems.
Authors: Laura Nolan
Article shepherded by: Effie Mouzeli
Improving On-call Fatigue
Daria argues the notion that "On-call shifts should be stressful and trying”, by suggesting ideas on how to spin on-call to be positive, educating, and bring teams together.
Authors: Daria Barteneva
Article shepherded by: Effie Mouzeli
Thirty-Five Years of LISA
With the LISA conference ending, the LISA Steering Committee decided to collect a history of the conference, that started in 1987 and end in 2021.
Authors: Cory Lueninghoener, Carolyn Rowland
Article shepherded by: Rik Farrow
Musings on Operating Systems Research
The lineup, followed by a discussion of Timothy Roscoe's keynote at OSDI and ATC 2021
Authors: Rik Farrow
Article shepherded by: Rik Farrow