Pearls from MIT
For close to a decade now, I have been attending the annual MIT CIO conference . Always a delight to bump into old friends, and get some new perspective. Our own Mark McDonald led a panel...
View ArticleAdvanced Persistent Threats + Privateers = Cyberteers
“Advanced Persistent Threats” has become a euphemism for state sponsored cyber threats. The kind the US has legitimized with cyber sabotage, like stuxnet and follow on cyber attacks. I wonder if...
View ArticleWhat do Wal-Mart, Target, and President Obama have in common?
I’ve noticed an increase in rogue Facebook “Likes” lately, especially for these 3 topics (Wal-Mart, Target, and – specifically – “Obama is clueless”). In every case the Facebook user was (purportedly)...
View ArticleHonestly Now…Honest?
Dan Ariely, who has been a guest of ours in prior webinars, has really gotten some great press on “The Honest Truth About Dishonesty. How We Lie to Everyone – Especially Ourselves”. This is a must...
View ArticleWhat kind of world are we designing?
I have a confession to make. Having been in IT since I was knee high to a grass hopper, I often feel somewhat responsible for its failings. Almost Al Gore-like “I helped invent the Internet” kind of...
View Article2012 Healthcare Breaches
If you have followed my blog, you know that I annually review the US HHS breach report, just to see what kind of year we had in healthcare security. Well, enough time has gone by since the end of year...
View ArticleThe Travesty of Security Questions
It used to be a good idea. Ask something that was immediately obvious and only knowable by YOU or a very few people – and make it the last line of defense for a password reset or some other...
View ArticleThe Snowden Snowjob: Supergluing USB ports
While the drama about Edward Snowden continues, it’s interesting to see the effects. Clearly, this is an inflection point in the perception of security, especially insider risks. Every CEO’s worst...
View Article2013 Healthcare Breach Report
If you have followed my blog, you know that I annually review the US HHS breach report, just to see what kind of year we had in healthcare security. Well, enough time has gone by since the end of year...
View ArticleRevisiting the Hacker Mom in a Target Rich Environment
Target CIO, CEO resignations. The credit card hack may have something to do with it (although I suspect for the CEO there were other things in play as well – like earnings). And my colleague Anton...
View Article
More Pages to Explore .....