Global Cybersecurity Standards … Another Plea

“The Editor’s Letter,” in the May 2017 issue of the Communications of the ACM (CACM) by Moshe Y Vardi is about “Cyber Insecurity and Cyber Libertarianism.” The column is available at https://cacm.acm.org/magazines/2017/5/216316-cyber-insecurity-and-cyber-libertarianism/fulltext# Vardi’s column recognizes the deficiencies in cybersecurity that I’ve been harping on for years. He writes the following: “So here we are, 70 years […]

Continue reading Global Cybersecurity Standards … Another Plea

Cybersecurity Risk Model … Implicit or Explicit Consensus?

Whenever you engage with an online vendor or service, you must first click on the “Agree” button to indicate that you will honor the stated terms and conditions mandated by the site owner. Most individuals click the “Agree” button without thinking, knowing that activating the “Don’t Agree” button will result in your not being able […]

Continue reading Cybersecurity Risk Model … Implicit or Explicit Consensus?

Posted in SBN

Taxing Computers and Robots … Revisited

There have been quite a few recent articles that suggest taxing robots and using the collected funds to ease the negative impact of job losses and to train workers in modern technologies (particularly cybersecurity, in my opinion). One such article is Kevin J. Delaney’s “The robot that takes your job should pay taxes, says Bill […]

Continue reading Taxing Computers and Robots … Revisited

Posted in SBN

Security and Safety Co-Engineering Revisited

There are those who denigrate such websites as ResearchGate and Academia.edu because they are for-profit, which is a discussion that I will not get into here. If this particular argument is of interest to you, you should read the Discover magazine piece “Who Isn’t Profiting Off the Backs of Researchers” by Jon Tennant posted on […]

Continue reading Security and Safety Co-Engineering Revisited

Posted in SBN

Cybersecurity’s “Forward to the Past”

On June 21, 2017, Congress received a letter from 103 eminent cybersecurity experts and researchers (the list was compiled by NEDC (The National Election Defense Coalition) and partners) about reducing election hacking risks. You can link to the letter via Zack Wittaker’s article “Security experts warn lawmakers of election hacking risks” posted on June 21, […]

Continue reading Cybersecurity’s “Forward to the Past”

AI Systems’ Security and Safety … A No-Brainer?

The June 2017 issue of IEEE Spectrum is devoted to comparing AI (artificial intelligence) systems to the human brain. It is a special report containing eight articles under the umbrella of “Can We Copy the Brain?” We must ask whether this a reasonable endeavor? Will it give us a better understanding as to how to […]

Continue reading AI Systems’ Security and Safety … A No-Brainer?

Posted in SBN

AI Systems’ Security and Safety … A No-Brainer?

The June 2017 issue of IEEE Spectrum is devoted to comparing AI (artificial intelligence) systems to the human brain. It is a special report containing eight articles under the umbrella of “Can We Copy the Brain?” We must ask whether this a reasonable endeavor? Will it give us a better understanding as to how to […]

Continue reading AI Systems’ Security and Safety … A No-Brainer?

Posted in SBN

Conflict vs. Consensus Cybersecurity Risk Models

I gave a presentation at the end of April 2017 on “A Consensus Model for Optimizing Privacy, Secrecy, Security and Safety” at the IEEE Homeland Security Technology Conference. The topic occurred to me when reading a quote by Brookings Institute Fellow, Susan Hennessey, as follows: “We could set up our laws to reject surveillance outright, […]

Continue reading Conflict vs. Consensus Cybersecurity Risk Models

Protecting In-Vehicle, Vehicle-to-Vehicle, and Ex-Vehicle Systems

On May 5, 2017, I gave a presentation with the title “Cybersecurity in the Age of Autonomous Vehicles, Intelligent Traffic Controls and Pervasive Transportation Networks,” for which I was honored with the “Best Applications Track Paper” award, at the IEEE Long Island Systems, Applications and Technology (LISAT) Conference. The basic premise of my presentation is […]

Continue reading Protecting In-Vehicle, Vehicle-to-Vehicle, and Ex-Vehicle Systems

Campaign Lessons Learned—Part 3: Authenticity, Authority and Access

From the cybersecurity professionals’ point of view, identity and access management (IAM) is really all a matter of authenticity, authorization and access permissions. Similarly, if the origin of a news item or blog or comment can be traced to a provably authoritative source, then it is more likely to be taken to be true than […]

Continue reading Campaign Lessons Learned—Part 3: Authenticity, Authority and Access