When managing teams of "information workers", I believe the use of time sheets is indicative of a management failure. Here's why:
- If you have to rely on a timesheet to know what your staff are doing - you're doing it wrong
- If you can't trust your staff to work hard - you have problems a timesheet won't fix
- If you believe you have too many staff to manage - get more managers
- If you think anyone completes them accurately - you drank the kool aid
- If you think the time it takes to actually complete them accurately is worth it - you hate your staff
- If you manage your business from these inaccurate stats - you're making bad decisions
- If your senior people have PAs complete their timesheets for them - you're a hypocrite
- If you spent millions on a new timesheet system, but didn't make it any easier for the staff using the system - you just suck
Continue reading "Dropping Privileges in Python (pattern)"
Continue reading "Mobile Privacy-Enhancing Proxies"
Originally published on SensePost's blog.
While doing some thinking on threat modelling I started examining what the usual drivers of security spend and controls are in an organisation. I've spent some time on multiple fronts, security management (been audited, had CIOs push for priorities), security auditing (followed workpapers and audit plans), pentesting (broke in however we could) and security consulting (tried to help people fix stuff) and even dabbled with trying to sell some security hardware. This has given me some insight (or at least an opinion) into how people have tried to justify security budgets, changes, and findings or how I tried to. This is a write up of what I believe these to be (caveat: this is my opinion). This is certainly not universalisable, i.e. it's possible to find unbiased highly experienced people, but they will still have to fight the tendencies their position puts on them. What I'd want you to take away from this is that we need to move away from using these drivers in isolation, and towards more holistic risk management techniques, of which I feel threat modelling is one (although this entry isn't about threat modelling).
Continue reading "Squinting at Security Drivers & Perspective-based Biases"