Author Archive

How Critical Infrastructure Is Vulnerable to Insider Threat

While the insider threat in government agencies and large companies is a known problem, less is known about the insider threat to critical US infrastructure, such as water purification or nuclear power plants. To illustrate the nature of the threats, here are...  [Read More]

China and Cybersecurity

Jon Lindsay recently published an interesting article in the Winter 2014/2015 edition of the journal International Security. The article provides an in-depth and balanced assessment of the issues surrounding China and its activities involving the internet and cybersecurity. Lindsay correctly points out...  [Read More]

President Obama at Stanford University Cybersecurity Summit

It would appear that the issue of cyber security has finally been brought front and center into the national spotlight. Recently, President Obama traveled to Stanford University to participate and deliver remarks at the ‘White House Summit on Cybersecurity and Consumer Protection’...  [Read More]

One Step Forward, Two Steps Back

It has been no secret that women are underrepresented in STEM fields. By some estimates it ranges from 15-20% of the workforce . . . and this at a time when industry is desperate for skilled employees in the STEM areas. There...  [Read More]

Look Mom…No Hands!

It would appear from news sources and technology magazines that we are headed full throttle towards driverless cars in the not-so-distant future. There will no doubt be those who welcome ‘auto parking’, ‘summon car’ and the reduced traffic congestion that autonomous cars...  [Read More]

Defending and Protecting in Cybersecurity? More Funding Is Needed

In the wake of all of the cyber attacks, big box store breaches, bank breaches and cyber espionage there are other organizations that are at war with these bad actors in cyber space. The cybersecurity industry is only focused now on big...  [Read More]

AI: We Can…But Should We?

Ask yourself – what do Bill Gates, Steven Hawking and Elon Musk all have in common? Recently they have all questioned the relentless pursuit of Artificial Intelligence (AI) by scientists. Artificial intelligence..the ability of machines to think for themselves was once fiction...  [Read More]

Lessons from Anthem Attack

Perhaps the biggest lesson from the Anthem theft of data is the action being taken by Attorneys General from several major states. Efforts to protect consumers have long been a mission of states. This cyber theft is causing grief to individuals that...  [Read More]

Executive Order on Cybersecurity: Billion-Dollar Bank Heist

It was another exciting week in cybersecurity. Last Friday, February the 13th, the White House and Silicon Valley leaders met at Stanford University for a discussion on cybersecurity and consumer protection. The meeting focused on measures that could be taken to improve...  [Read More]

Webinar: Cyber Insurance

On January 28, 2015 and in recognition of Data Privacy Day 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “Cyber Insurance”. In today’s risky environment, it’s not if, but when. At some point your organization will be the target of...  [Read More]