Tag Archives: security procedures

For Better or Worse, Global Banking Will Encounter Global Cyber Threats

The Washington Post report on the suspected North Korean cyberattack is troubling in a number of ways. If true, the attack signals that commercial institutions are – as many have suspected – the targets of weapons-grade, state-sponsored cyberattacks and exploits. Such … Continue reading

Posted in Cyber Security, Cybersecurity, Government, News | Tagged , , , | Leave a comment

Operating in Cyberspace – DoD’s Policy Architecture Begins to Emerge

Moves to put in place another aspect of the national cybersecurity strategy environment occurred recently with the release of the Department of Defense Strategy for Operating in Cyberspace. The strategy, delivered by Deputy Secretary of Defense, William J. Lynn III, marks … Continue reading

Posted in Cyber Security, Cybersecurity, News | Tagged , , | 1 Comment

Privacy and Security – Does Anyone REALLY Care?

There has recently been a spate of data breaches and reported cyber-attacks. Epsilon, and SONY PlayStation have lost data on millions; Amazon’s Cloud services were taken down; the RSA SecureID token was compromised, and the South Korean financial institution Nonghyup … Continue reading

Posted in Cloud Computing, Cyber Security, Cybersecurity, Privacy | Tagged , , , , , , , | Leave a comment

Lifting the Fog Around the Internet Kill Switch Debate

There is a lot of buzz and discussion around the danger of giving the President of the United States the authority to cut-off citizen access to the Internet – the so-called “Internet kill switch.”  I recently appeared on Fox News … Continue reading

Posted in Cybersecurity, News | Tagged , , | Leave a comment

Information Security Isn’t a Destination, It’s a Process – A Perspective on Hackers Penetrating Nasdaq Computers

After reading the article in the WSJ about hackers penetrating Nasdaq computers a simple analogy came to mind that paints a clear picture of how things have changed.  While bank robber Willie Sutton never actually said the phrase, it has … Continue reading

Posted in Cybersecurity, News | Tagged , , , | Leave a comment

Reactions to Wikileaks: How to Share Information While Ensuring Security

As we consider the question of WikiLeaks, we need to examine and balance two issues:  Security and collaboration.  One might think intuitively that these two issues stand in opposition to each other.  In fact, the reverse is true.  Effective collaboration … Continue reading

Posted in Cybersecurity | Tagged , , , , | 3 Comments