Jack is a serial entrepreneur and a frequent speaker and writer about information security topics. He has contributed to the U.S. Army War College; the Center on Law, Ethics and National Security; and the House Subcommittee on Information Technology. He also holds five patents and has additional patents pending in kernel security, secure remote communications, systems management and distributed computing.
"Having spent almost twenty years in the security industry, I've witnessed its evolution - both positive and negative. This blog provides a platform for me to share some of my experiences and thoughts with a larger audience," Danahy said. "There is never enough dialog that can take place when discussing issues as important as security, so I'm blogging about my opinions and information I think is interesting or important, because I believe that with enough of the right information, people will make better decisions about security."
Recent posts from Suitable Security include:
Are We Looking at an ID Theft Stimulus Package? - In which Jack comments about the concept of a national repository for the healthcare records of all U.S. citizens, as proposed by the recent economic stimulus bill.
Cyber security and the lessons of Hurricane Katrina - In which Jack compares the reactionary improvements in protective dike levels in New Orleans to increasingly powerful hurricanes vis-a-vis cyber security reactions to increasingly large data breaches.
Five rules to saving money by avoiding security shelfware - In which Jack recommends tactics for eliminating unused security software - and worse - unaddressed security problems.
Jack's Suitable Security blog is located here: http://suitablesecurity.blogspot.com/