C. Warren Axelrod

The Burisma Hack … Cyberwar or Not?

Just to complicate things further, we learned from a New York Times article that Russian military cyber-forces hacked into Ukrainian…

10 months ago

Another Boeing Software “Glitch”

How I hate the word “glitch,” which is commonly used to describe faulty software in press reports, blogs, and the…

11 months ago

Y2K … Two Decades Later

Why didn’t I use the title “Y2K at Twenty” for this column to match “The FS-ISAC at Twenty” that was…

11 months ago

The FS-ISAC at Twenty

The FS-ISAC (Financial Services Information Sharing and Analysis Center) was launched in October 1999 by Treasury Secretary Lawrence Summers. It…

12 months ago

The Cyber Tipping Point—Are We There Yet?

As known cyberattacks are being reported as increasing in number, frequency and severity, you have to ask whether we are…

12 months ago

Strong Authentication is Good, Unless …

… it results in your being arrested! In her September 28, 2019 article, “Army communication head at Mar-a-Lago sentenced for…

1 year ago

Another Fifth … Quantum Dawn Cybersecurity Exercise

Another Fifth … Quantum Dawn Cybersecurity Exercise Following my BlogInfoSec column “Taking the Fifth …” posted on October 29, 2019,…

1 year ago

Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities,…

1 year ago

Taking the Fifth …

“The Fifth Domain” is a recent book by Richard A. Clarke and Robert K. Knake. It is about cybersecurity and…

1 year ago

Pretending about Cybersecurity Risks

I have written a couple of columns comparing cybersecurity risk management to managing climate change—one with the title “Cybersecurity Climate…

1 year ago