Truth, Trust and Cybersecurity Risk

It is a sad reflection on the times, but it is becoming increasingly difficult to distinguish among true and false “facts,” accurate and misleading interpretations, and personal and politically-expedient beliefs. In my ...

Cybercriminals’ Motivations during Catastrophic Times

Brittany Haynes wrote an article about “How Criminals Are Benefitting From the COVID-19 Crisis” on March 19, 2020, which is available at https://www.igi-global.com/newsroom/archive/malicious-threat-your-inbox-covid/4477?utm_source=IGI+Global+Products+and+Publishing+Opportunities&utm_campaign=58a5a8500d-EMAIL_CAMPAIGN_Research_Trends_1_19_wk1_COPY_01&utm_medium=email&utm_term=0_bcbd627034-58a5a8500d-47781814 Haynes’s article references a March 9, 2020 article by ...

Cybersecurity Risk Management … Beyond the “Golden Period”

Where do we stand with the management of cybersecurity risk? Answer … Not in a good place. This position was further augmented upon reading an article in the January 23, 2020 Washington ...

The Burisma Hack … Cyberwar or Not?

Just to complicate things further, we learned from a New York Times article that Russian military cyber-forces hacked into Ukrainian gas company, Burisma, apparently in an attempt to find incriminating evidence against ...

Another Boeing Software “Glitch”

How I hate the word “glitch,” which is commonly used to describe faulty software in press reports, blogs, and the like. In my opinion, it trivializes serious software errors. So, when the ...

Y2K … Two Decades Later

Why didn’t I use the title “Y2K at Twenty” for this column to match “The FS-ISAC at Twenty” that was posted on BlogInfoSec on January 6, 2020? Good question … easy answer ...

The FS-ISAC at Twenty

The FS-ISAC (Financial Services Information Sharing and Analysis Center) was launched in October 1999 by Treasury Secretary Lawrence Summers. It was the first such entity. Many subsequent ISACs have used the FS-ISAC ...

The Cyber Tipping Point—Are We There Yet?

As known cyberattacks are being reported as increasing in number, frequency and severity, you have to ask whether we are reaching, or have already reached, a tipping point where everyone gets so ...

Strong Authentication is Good, Unless …

… it results in your being arrested! In her September 28, 2019 article, “Army communication head at Mar-a-Lago sentenced for lying,” Jane Musgrave describes how an army officer in charge of communications ...

Another Fifth … Quantum Dawn Cybersecurity Exercise

Another Fifth … Quantum Dawn Cybersecurity Exercise Following my BlogInfoSec column “Taking the Fifth …” posted on October 29, 2019, I came across other “fives,” the most relevant of which was about ...