Cybersecurity Lessons from the Pandemic: Data – Part 2
Having discussed issues relating to the collection and reporting of COVID-19 data in Part 1, we now turn to cyberspace, even though the jury is still out regarding much of the pandemic data. Equivalent situations to those described with respect to the pandemic regarding deficiencies in the collecting and reporting ... Read More
Cybersecurity Lessons from the Pandemic: Data – Part 1
The collection and reporting of data relating to the coronavirus pandemic and related medical research and practices are in a shambles. For example, a June 7, 2020 article by Jason Slotkin cites several reasons for undercounting cases.[i] One is that testing was impeded by public officials and governments. Another is ... Read More
Outsourcing, Supply Chains and (National) Security
For all intents and purposes, the terms “outsourcing” and “supply chain” are used interchangeably and refer to when you are dependent on a third party for providing products and services. However, there are many examples of internal sourcing (or “insourcing”), where supply chains consist of entities and processes under the ... Read More
Value and Uncertainty in Pandemic Metrics
New York Governor Andrew Cuomo’s daily briefings have become a mainstay of support for many during the COVID-19 pandemic, especially with New York being the initial epicenter of the disease in the U.S. It is clear that Cuomo’s polished slide presentations have been developed by consultants with strong management science, ... Read More
Surveillance, Privacy and Trust
In his starkly titled article, “Has Trust Become Irrelevant?” in the Sunday Review section of The New York Times of January 19, 2020, Laurence Scott lays out why, when so many are under surveillance, privacy is gone, and trust becomes meaningless. The underlying concept is that, if you have someone ... Read More
Security Risks during Recovery and Repair
With “all hands-on deck” battling the coronavirus pandemic, it is difficult to turn one’s attention to recovery and reconstruction of the many organizations that have had to be reduced or closed down Yet now is the time to be planning and preparing for recovery and rebuilding, as some reporters are ... Read More
Truth, Trust and Cybersecurity Risk
It is a sad reflection on the times, but it is becoming increasingly difficult to distinguish among true and false “facts,” accurate and misleading interpretations, and personal and politically-expedient beliefs. In my November 11, 2019 BlogInfoSec column “Are Cybersecurity Intelligence and Security Metrics Statistically Significant?” I pointed out some of ... Read More
Cybercriminals’ Motivations during Catastrophic Times
Brittany Haynes wrote an article about “How Criminals Are Benefitting From the COVID-19 Crisis” on March 19, 2020, which is available at https://www.igi-global.com/newsroom/archive/malicious-threat-your-inbox-covid/4477?utm_source=IGI+Global+Products+and+Publishing+Opportunities&utm_campaign=58a5a8500d-EMAIL_CAMPAIGN_Research_Trends_1_19_wk1_COPY_01&utm_medium=email&utm_term=0_bcbd627034-58a5a8500d-47781814 Haynes’s article references a March 9, 2020 article by Bradley Barth with the title “Don’t get fooled again: Fake coronavirus emails impersonate the WHO to deliver FormBook ... Read More
Cybersecurity Risk Management … Beyond the “Golden Period”
Where do we stand with the management of cybersecurity risk? Answer … Not in a good place. This position was further augmented upon reading an article in the January 23, 2020 Washington Post by Anna Fifield with the title “Wuhan quarantine expands as Chinese fear authorities withholding information about coronavirus ... Read More
The Burisma Hack … Cyberwar or Not?
Just to complicate things further, we learned from a New York Times article that Russian military cyber-forces hacked into Ukrainian gas company, Burisma, apparently in an attempt to find incriminating evidence against prior Board member, Hunter Biden, so as to discredit his father, Joe Biden, in the latter’s run for ... Read More

