Quantcast
Channel: InfoSec Economics – BlogInfoSec.com
Browsing latest articles
Browse All 14 View Live

Image may be NSFW.
Clik here to view.

Cloud Computing Security at Newsweek

Daniel Lyons will publish an op-ed on the insecurity of cloud computing in Newsweek‘s February 1st, 2010 issue. The  main thrust of the article can be summarized as such: But there is one big, glaring...

View Article



Image may be NSFW.
Clik here to view.

Response to Gary Hinson

First, you should know that I very much agree with and respect Gary Hinson’s approach to infosec. I have frequently quoted his definitive paper “Seven myths about information security metrics,” which...

View Article

Image may be NSFW.
Clik here to view.

Vindication for Toyota? Proving the Negative

In my February 16, 2010 Bloginfosec column “Negative Testing Revisited – Vehicle Control Systems (Part 1),” I describe and discuss the concerns about the software controlling the brakes on Toyota...

View Article

Image may be NSFW.
Clik here to view.

The Economics of Safety and Security

One of the most horrifying comments through the entire Japanese mega-catastrophe was that by CNBC anchor Larry Kudlow, as reported in a March 20, 2011 New York Times article by Jeff Sommer with the...

View Article

Image may be NSFW.
Clik here to view.

Nastier at NASDAQ and the ROI of Security

Here is a correction to “Nastiness at NASDAQ” BlogInfoSec, March 7, 2011. The first sentence of the second paragraph should read “From my particular perspective, the most disturbing aspect of the...

View Article


Image may be NSFW.
Clik here to view.

Will Cloud Security Drive You Insane?

First, the transparency … I have known Jim Reavis, co-founder of the Cloud Security Alliance (CSA), for a dozen years or so. He is a true visionary. He met with me before creating the CSA and asked me...

View Article

Outsourcing and Offshoring – Now Insourcing and Reshoring

There have been hints about the recent movement towards “insourcing” and “reshoring,” along with the usual confusion regarding terms used. In the December 2012 issue of The Atlantic magazine (pages...

View Article

At Last! A Reporter Who Understands Cybersecurity

We are bombarded with TV news, newspaper articles, blogs, comments, and the like, about cybersecurity. Most reporters seem to be in awe of the attackers (sophisticated criminals and nation states, for...

View Article


Protecting In-Vehicle, Vehicle-to-Vehicle, and Ex-Vehicle Systems

On May 5, 2017, I gave a presentation with the title “Cybersecurity in the Age of Autonomous Vehicles, Intelligent Traffic Controls and Pervasive Transportation Networks,” for which I was honored with...

View Article


Are Ransom Payments Supporting Terrorists?

Organizations, particularly those that recognize that they don’t have essential security and data recovery measures in place, have taken out cyber insurance, which they are regularly using to pay off...

View Article
Browsing latest articles
Browse All 14 View Live




Latest Images