Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Conflict vs. Consensus Cybersecurity Risk Models

– I gave a presentation at the end of April 2017 on “A Consensus Model for Optimizing Privacy, Secrecy, Security and Safety” at the IEEE Homeland Security Technology Conference. The topic occurred to me when reading a quote by Brookings Institute Fellow, Susan Hennessey, as follows: “We could…

Protecting In-Vehicle, Vehicle-to-Vehicle, and Ex-Vehicle Systems

– On May 5, 2017, I gave a presentation with the title “Cybersecurity in the Age of Autonomous Vehicles, Intelligent Traffic Controls and Pervasive Transportation Networks,” for which I was honored with the “Best Applications Track Paper” award, at the IEEE Long Island Systems, Applications…

Campaign Lessons Learned—Part 3: Authenticity, Authority and Access

– From the cybersecurity professionals’ point of view, identity and access management (IAM) is really all a matter of authenticity, authorization and access permissions. Similarly, if the origin of a news item or blog or comment can be traced to a provably authoritative source, then it is more…

Cybersecurity Risk Metrics … Why Don’t They Get It?

– The problem with cybersecurity is the metrics that are used to assess and manage security risks. In November 2008, I published an article “Accounting for Value and Uncertainty in Security Metrics,” in ISACA Journal, which subsequently won the 2009 Michael P. Cangemi Best Book/Best Article…

HAL as Your Car’s Co-Pilot

– If you recall, in my BlogInfoSec column of May 2, 2016 “Lip Reading Computers … Here Comes HAL,” I described an article about how computers were being trained to lip read and immediately related it to the treacherous lip-reading computer named HAL from the movie “2001: A Space Odyssey.”…