Cyber Threats

How Critical Infrastructure Is Vulnerable to Insider Threat

While the insider threat in government agencies and large companies is a known problem, less is known about the insider threat to critical US infrastructure, such as water purification or nuclear power plants. To illustrate the nature of the threats, here are...  [Read More]

China and Cybersecurity

Jon Lindsay recently published an interesting article in the Winter 2014/2015 edition of the journal International Security. The article provides an in-depth and balanced assessment of the issues surrounding China and its activities involving the internet and cybersecurity. Lindsay correctly points out...  [Read More]

Defending and Protecting in Cybersecurity? More Funding Is Needed

In the wake of all of the cyber attacks, big box store breaches, bank breaches and cyber espionage there are other organizations that are at war with these bad actors in cyber space. The cybersecurity industry is only focused now on big...  [Read More]

AI: We Can…But Should We?

Ask yourself – what do Bill Gates, Steven Hawking and Elon Musk all have in common? Recently they have all questioned the relentless pursuit of Artificial Intelligence (AI) by scientists. Artificial intelligence..the ability of machines to think for themselves was once fiction...  [Read More]

Lessons from Anthem Attack

Perhaps the biggest lesson from the Anthem theft of data is the action being taken by Attorneys General from several major states. Efforts to protect consumers have long been a mission of states. This cyber theft is causing grief to individuals that...  [Read More]

Cyber Crime: Has Your Purchase Order Been a Scam? How Can This Scam Be Prevented?

In the United States there are 7.8 million women that own businesses. This is a 20.1% increase from 2002-2007. Women-owned firms make up 28.7% of non-farm businesses across the country with an average of $1.2 trillion in total receipts. With this many...  [Read More]

Cars, the Internet of Things, and Cyber Risk

A newly released report by Senator Ed Markey(D) of Massachusetts highlights the risk of wireless hacking into the control systems of new cars. New cars may contain as many as a hundred million lines of code. The newest and most advanced fighter,...  [Read More]

Pressure Points – Management and IT

Most organizations have to handle cyber security improvements on the fly; while the business is operating and while other elements of the company are changing and expanding the IT function. A frequent lament is that if everything would just stand still for...  [Read More]

The Categories of Insider Threat: Part 2

Last week’s blog discussed two of the four levels of insider threat. I wrote about pure insider threat and insider associate levels. This week, I will discuss the other two levels of insider threat – inside affiliate and outside affiliate – and...  [Read More]

My Insurance/Credit Card/Store Just Got Hacked, What Should I Do?

It seems hardly a week goes by before the morning news brings the announcement that another major company has suffered a data breach. This week it is the health care company Anthem that has been breached. In this instance some 80 million...  [Read More]