risks
The NSA on the Risks of Exposing Location Data
The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely on features disabled by such ...
The Unintended Harms of Cybersecurity
Interesting research: "Identifying Unintended Harms of Cybersecurity Countermeasures": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks to their services or systems. In some cases, those countermeasures ...
COVID-19 Risks of Flying
I fly a lot. Over the past five years, my average speed has been 32 miles an hour. That all changed mid-March. It's been 105 days since I've been on an airplane ...
On Cyber Warranties
Interesting article discussing cyber-warranties, and whether they are an effective way to transfer risk (as envisioned by Ackerlof's "market for lemons") or a marketing trick. The conclusion: Warranties must transfer non-negligible amounts ...
NSA on the Future of National Cybersecurity
Glenn Gerstell, the General Counsel of the NSA, wrote a long and interesting op-ed for the New York Times where he outlined a long list of cyber risks facing the US. There ...
On Cybersecurity Insurance
Good paper on cybersecurity insurance: both the history and the promise for the future. From the conclusion: Policy makers have long held high hopes for cyber insurance as a tool for improving ...
Report: Concerted Global Cyber Attack Could Disrupt Global Economy
According to a hypothetical cyber risk scenario prepared by the Cyber Risk Management (CyRiM) project for risk management purposes, a ransomware strain that can disrupt more than 600,000 businesses worldwide within 24 ...
Survey: Only Four Percent of U.S. Adults are Concerned about Cybersecurity during Summer Vacation
This summer, my family and I visited a few Arizona ghost towns, and the experience made me wonder what it might have been like to travel across the Old West with all ...
Multi-Factor Authentication: More Secure Access to Cloud Apps
Use multi-factor authentication to put a stronger barrier between your critical data in the cloud and the cyber criminals who?d love to get access to it. But choose your solution carefully to ...
Dan Geer on the Dangers of Computer-Only Systems
A good warning, delivered in classic Dan Geer style ...

