Security Risks during Recovery and Repair

With “all hands-on deck” battling the coronavirus pandemic, it is difficult to turn one’s attention to recovery and reconstruction of the many organizations that have had to be reduced or closed down ...

Y2K … Two Decades Later

Why didn’t I use the title “Y2K at Twenty” for this column to match “The FS-ISAC at Twenty” that was posted on BlogInfoSec on January 6, 2020? Good question … easy answer ...

The Cyber Tipping Point—Are We There Yet?

As known cyberattacks are being reported as increasing in number, frequency and severity, you have to ask whether we are reaching, or have already reached, a tipping point where everyone gets so ...

Another Fifth … Quantum Dawn Cybersecurity Exercise

Another Fifth … Quantum Dawn Cybersecurity Exercise Following my BlogInfoSec column “Taking the Fifth …” posted on October 29, 2019, I came across other “fives,” the most relevant of which was about ...

Pretending about Cybersecurity Risks

I have written a couple of columns comparing cybersecurity risk management to managing climate change—one with the title “Cybersecurity Climate Change” (December 10, 2018), and the other “The Cybersecurity Paradox” (June 19, ...

Are Ransom Payments Supporting Terrorists?

Organizations, particularly those that recognize that they don’t have essential security and data recovery measures in place, have taken out cyber insurance, which they are regularly using to pay off ransomware attackers ...