Cloud Computing Security at Newsweek
Daniel Lyons will publish an op-ed on the insecurity of cloud computing in Newsweek‘s February 1st, 2010 issue. The main thrust of the article can be summarized as such: But there is one big, glaring...
View ArticleResponse to Gary Hinson
First, you should know that I very much agree with and respect Gary Hinson’s approach to infosec. I have frequently quoted his definitive paper “Seven myths about information security metrics,” which...
View ArticleVindication for Toyota? Proving the Negative
In my February 16, 2010 Bloginfosec column “Negative Testing Revisited – Vehicle Control Systems (Part 1),” I describe and discuss the concerns about the software controlling the brakes on Toyota...
View ArticleThe Economics of Safety and Security
One of the most horrifying comments through the entire Japanese mega-catastrophe was that by CNBC anchor Larry Kudlow, as reported in a March 20, 2011 New York Times article by Jeff Sommer with the...
View ArticleNastier at NASDAQ and the ROI of Security
Here is a correction to “Nastiness at NASDAQ” BlogInfoSec, March 7, 2011. The first sentence of the second paragraph should read “From my particular perspective, the most disturbing aspect of the...
View ArticleWill Cloud Security Drive You Insane?
First, the transparency … I have known Jim Reavis, co-founder of the Cloud Security Alliance (CSA), for a dozen years or so. He is a true visionary. He met with me before creating the CSA and asked me...
View ArticleOutsourcing and Offshoring – Now Insourcing and Reshoring
There have been hints about the recent movement towards “insourcing” and “reshoring,” along with the usual confusion regarding terms used. In the December 2012 issue of The Atlantic magazine (pages...
View ArticleAt Last! A Reporter Who Understands Cybersecurity
We are bombarded with TV news, newspaper articles, blogs, comments, and the like, about cybersecurity. Most reporters seem to be in awe of the attackers (sophisticated criminals and nation states, for...
View ArticleProtecting In-Vehicle, Vehicle-to-Vehicle, and Ex-Vehicle Systems
On May 5, 2017, I gave a presentation with the title “Cybersecurity in the Age of Autonomous Vehicles, Intelligent Traffic Controls and Pervasive Transportation Networks,” for which I was honored with...
View ArticleAre Ransom Payments Supporting Terrorists?
Organizations, particularly those that recognize that they don’t have essential security and data recovery measures in place, have taken out cyber insurance, which they are regularly using to pay off...
View Article
More Pages to Explore .....