tag:blogger.com,1999:blog-4088979.post8497697596119195447..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: February 2007 (IN)SECURE MagazineRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-4088979.post-46966618176987783292007-11-08T01:46:00.000-05:002007-11-08T01:46:00.000-05:00You may not have heard /of/ TK, but you've most ce...You may not have heard /of/ TK, but you've most certainly heard him if you've attended CansecWest the past few years. I met him during one of the breaks last year, and learned he was the guy asking such good questions in the front-left corner of the room. Sharp fella.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-32194201190027114712007-03-02T11:16:00.000-05:002007-03-02T11:16:00.000-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-69919241434980571882007-02-20T18:53:00.000-05:002007-02-20T18:53:00.000-05:00Hey Rich, While Gula and Ranum are better known, I...Hey Rich, <BR/><BR/>While Gula and Ranum are better known, I wasn't talking about their ability to be marketers. TK, Ron and Marcus are all able to bridge technology with management experience in a way that few others can. TK certainly isn't as well-known, but anyone who has met him (like Jordan above) or experienced working with him can attest to his amazing ability to synthesize technical and business issues into a coherent strategy. <BR/><BR/>I picked those three for a reason - if it was just about being "heard of", I'd have had Bruce, Marty, and a few other of the security luminaries mentioned there ahead of Ron & TK, as well. <BR/><BR/>:)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-8482355859808020582007-02-19T19:19:00.000-05:002007-02-19T19:19:00.000-05:00I enjoyed Didier's article regarding the use of RO...I enjoyed <A HREF="http://didierstevens.wordpress.com/" REL="nofollow">Didier</A>'s article regarding the use of ROT-13 "encryption" in the Windows Registry...<BR/><BR/>HarlanH. Carveyhttps://www.blogger.com/profile/08966595734678290320noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-10300224973624621062007-02-16T11:56:00.000-05:002007-02-16T11:56:00.000-05:00You may not have heard /of/ TK, but you've most ce...You may not have heard /of/ TK, but you've most certainly heard him if you've attended CansecWest the past few years. I met him during one of the breaks last year, and learned he was the guy asking such good questions in the front-left corner of the room. Sharp fella.Jordanhttps://www.blogger.com/profile/08341608982649448622noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-15330003903265532412007-02-15T19:27:00.000-05:002007-02-15T19:27:00.000-05:00Thanks for turning me on to this, Richard! I have...Thanks for turning me on to this, Richard! I have read almost every word of the last few issues. The coverage of Vista is very good, as is the (shortish) interview with Joanna Rutkowska. The PCI compliance piece, while not a page turner, is very nice.inthebeginningtherewasacehttps://www.blogger.com/profile/17263151474570524394noreply@blogger.com