Two Long-Reads on Net Security and Insecurity
> Washington Post’s “Net of Insecurity” series: Part 1 – [The Long Life of a Quick ‘Fix’; Internet Protocol from 1989 Leaves Data Vulnerable to Hijackers](http://www.washingtonpost.com/sf/business/2015/05/31/net-of-insecurity-part-2/); Part 2 – [A Flaw in the Design; The Internet’s Founders Saw its Promise But Didn’t Foresee Users Attacking One Another](http://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/)
> Should Companies Do Most of Their Computing in the Cloud? ([part 1](https://www.schneier.com/blog/archives/2015/06/should_companie.html), [part 2](https://www.schneier.com/blog/archives/2015/06/should_companie_1.html) and [part 3](https://www.schneier.com/blog/archives/2015/06/should_companie_2.html) – Bruce Schneier