There's a lot more I want to graph and look at though. I especially want to see how different demographics pick different email providers. That and getting a map for zip-codes and making a heatmap of the applicants' locations then subtracting that from a population density map.
I am happy about each and every database leak that makes people aware about the issues with data-mongering. As long as I am not in one of them. Then it feels really really bad (my credentials were "stolen" (ie copied) in a customer database of a hardware shop, since then I get personalised spam and the store still has not notified the thousands of customers whose details are out there).
They are trustworthy enough that I can rule that out. Could have been an employer of course. The list was posted online at some point. And the shop acknowledged the incident and is working with the police.
I used the quotation marks because of course the data was copied, not stolen, but the word "stolen" is usually used.
He would only be hypocritical if he was data-mongering himself, or leaking other people's information. Instead it is a selfish attitude, since the consequences to the affected people don't matter as long as he isn't one of them.
I don't think so -- people don't think of security when they think CRUD applications. What they do think about is outsourcing it to a team of 10 people that will work for $1/day on it. And then they get what they pay for.
Hire competent programmers to do important tasks and you won't be disappointed. The problem is that there aren't very many competent programmers.
I don't intend to imply that security products/services will address the problems inherent to badly architected/implemented IT systems.
Just that we can expect to see an upswing in expenditures for these sorts of tack-on products/services from CIOs seeking silver-bullet assurances from those naive about their corporate infrastructures' security exposure, or blame deflection, from those savvy about the same.
In other words, it might be a good time to start a white-hat IT security audit tools/services company.
But the targets are usually not so prominent. As higher profile attacks occur, people in related companies will start to worry if they're next, and start a spending frenzy to try and prevent it (it is, of course, doubtful any product they buy will do any good).
The ratio of females to males is about 1.6
Average age is 27
Top ten email address domains:
There's a lot more I want to graph and look at though. I especially want to see how different demographics pick different email providers. That and getting a map for zip-codes and making a heatmap of the applicants' locations then subtracting that from a population density map.