The Cost of Trust: How Secure Are Your Toys?

Consumers Must Demand that Internet-Connected toys Offer the Basics of Trust and Security

You’ve planned a precision military strike; readied your forces and resources to acquire the target when it’s at hand; and done all the intel and weighed your options between kinetic and digital operations.

read more

Continue reading The Cost of Trust: How Secure Are Your Toys?

The Connected Conundrum: Why I No Longer Trust My Toaster

On Friday, October 21, the Internet slowed to a crawl. A new botnet attack, called Mirai, executed a distributed denial-of-service (DDoS) attack against DNS provider Dyn. The result impacted service for some of the Web’s highest profile brands. This event was the largest known DDoS attack to date.

read more

Continue reading The Connected Conundrum: Why I No Longer Trust My Toaster

The Connected Conundrum: Why I No Longer Trust My Toaster

On Friday, October 21, the Internet slowed to a crawl. A new botnet attack, called Mirai, executed a distributed denial-of-service (DDoS) attack against DNS provider Dyn. The result impacted service for some of the Web’s highest profile brands. This event was the largest known DDoS attack to date.

read more

Continue reading The Connected Conundrum: Why I No Longer Trust My Toaster

Running in Front of the Open Source Parade

There is simply no denying that the adoption of open source components in software development is pervasive and will continue to expand. Black Duck, an open source security firm, noted in their “State of Open Source Security in Commercial Applications, 2016” report that 67 percent of the applications tested had some form of open source component.

read more

Continue reading Running in Front of the Open Source Parade

Go Boldly to the Cloud: Embracing the Security Benefits of the Cloud Infrastructure

Less than ten minutes driving west from my home, you encounter a vast expanse of large, windowless buildings. Situated near them are impressive physical plants dedicated to cooling these buildings and providing back-up power in the case of a power fail… Continue reading Go Boldly to the Cloud: Embracing the Security Benefits of the Cloud Infrastructure

How Connected Cars are Driving Greater Security Concerns

Early in 2001, before I was even in the IT Security business, I saw a glimpse of the future. While at a CIO conference dinner, I started talking to a gentleman who was responsible for the IT infrastructure behind an emerging new service called OnStar. The conversation soon turned to the many challenges he faced—problems that were not readily apparent to the automobile industry, much less the general population.

read more

Continue reading How Connected Cars are Driving Greater Security Concerns