Are cybercriminals by nature evil? Only the 1930s pulp magazine hero The Shadow really knows “what evil lurks in the hearts” of cybercriminals. At first glance, it would appear there is great deal of darkness in the hearts of malicious ha… Continue reading Are Cybercriminals Evil or Greedy?
Tens of billions of dollars each year are spent on cybersecurity, yet cybercriminals continue to succeed. There seems to be a never-ending stream of cybersecurity bad news. Companies constantly experience negative security events – Facebook, Ver… Continue reading Cybersecurity Fosters Competitive Advantage
Words have meaning. When I was writing policies, it was imperative that ‘shall’, ‘will’, ‘may’ and ‘must’ be used correctly. The significance of a statement is dependent upon the word selected. With this in mi… Continue reading Wordsmithing: Cybersecurity or Cyber Safety?
I’ve had it. It is time to retire some of the old, worn-out cybersecurity clichés polluting the landscape. Clichés are painful to hear. At the top of the list is the ‘defender’s dilemma’. This platitude states that breaches o… Continue reading Time to Retire a Cybersecurity Cliché
Cybersecurity is a competitive endeavor. This contest is framed as ‘us versus them,’ attackers versus defenders, and good guys versus bad guys. Analogies to sporting contests are common, thus resulting in similar descriptive language. Giv… Continue reading Winning the Cybersecurity Contest
Organizations have finally realized that mobile devices are a productivity tool. It became abundantly clear with the sudden necessity of work from home (WFH) that employees work best when they can access a mobile smartphone. One major reason mobile ph… Continue reading Keep Your Eye on the Camera
Enterprises and their staff dealt with a lot of change in 2020. The pandemic and resulting lockdowns forced organizations to allow staff to work from home. This vastly increased mobility, cloud computing and social networking usage; in some cases, thi… Continue reading Understand Your Staff: How Insiders Shape Defenses
The injection of sophisticated malware into SolarWinds software was attributed to Russian Intelligence. An unrelated attack, made possible by exploiting a vulnerability in SolarWinds software, is being attributed to Chinese hackers. Periodically, othe… Continue reading Cyber Privateering Complicates Attack Attribution
Have you ever had that feeling that something is amiss? While conducting research on when data encryption is required, I noticed something that seemed a little off. It is commonplace for regulations to require measures be taken to protect data. Many r… Continue reading Encryption Requirements Driven by Data State
Digital data provides the strength and vitality of the Information Age. Bits have as much, if not more, value than comparable assets in the physical world. Losing control of proprietary or critical information could have legal, financial or business r… Continue reading A Natural Law for Digital Data