Security Risks during Recovery and Repair

With “all hands-on deck” battling the coronavirus pandemic, it is difficult to turn one’s attention to recovery and reconstruction of the many organizations that have had to be reduced or closed down Yet now is the time to be planning… Continue reading Security Risks during Recovery and Repair

Truth, Trust and Cybersecurity Risk

It is a sad reflection on the times, but it is becoming increasingly difficult to distinguish among true and false “facts,” accurate and misleading interpretations, and personal and politically-expedient beliefs. In my November 11, 2019 Blo… Continue reading Truth, Trust and Cybersecurity Risk

Cybersecurity Risk Management … Beyond the “Golden Period”

Where do we stand with the management of cybersecurity risk? Answer … Not in a good place. This position was further augmented upon reading an article in the January 23, 2020 Washington Post by Anna Fifield with the title “Wuhan quarantine … Continue reading Cybersecurity Risk Management … Beyond the “Golden Period”

The Burisma Hack … Cyberwar or Not?

Just to complicate things further, we learned from a New York Times article that Russian military cyber-forces hacked into Ukrainian gas company, Burisma, apparently in an attempt to find incriminating evidence against prior Board member, Hunter Biden,… Continue reading The Burisma Hack … Cyberwar or Not?

Another Boeing Software “Glitch”

How I hate the word “glitch,” which is commonly used to describe faulty software in press reports, blogs, and the like. In my opinion, it trivializes serious software errors. So, when the word “glitch” showed up on the front pag… Continue reading Another Boeing Software “Glitch”

The FS-ISAC at Twenty

The FS-ISAC (Financial Services Information Sharing and Analysis Center) was launched in October 1999 by Treasury Secretary Lawrence Summers. It was the first such entity. Many subsequent ISACs have used the FS-ISAC as their model. The idea for ISACs w… Continue reading The FS-ISAC at Twenty

Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities, etc. I’m no different. It seems like a reasonable, generally accepted thing to do. So, I was somewhat surp… Continue reading Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities, etc. I’m no different. It seems like a reasonable, generally accepted thing to do. So, I was somewhat surp… Continue reading Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

“All for One and One for All”

… So chanted the Three Musketeers. One of my main issues with cybersecurity risk management is that organizations seek to secure their own systems, data and networks, hoping that attackers will move on and attack more vulnerable victims. I have h… Continue reading “All for One and One for All”